Browse > Article List

논문
1 Security Analysis on Digital Signature Function Implemented in Electronic Documents Software
Park, Sunwoo;Lee, Changbin;Lee, Kwangwoo;Kim, Jeeyeon;Lee, Youngsook;Won, Dongho; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.945-957,
2 Study of Local Linkability based on Modified Linear Encryption in Group Signature Schemes
Kang, Jeonil;Kim, Kitae;Nyang, DaeHun;Lee, KyungHee; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.959-974,
3 Exception Management of Well-behaved Users in Group Signature Schemes based on Linear Encryption
Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.975-985,
4 Software integrity verification method in POS system
Cho, Sung-A;Kim, Sung Hoon;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.987-997,
5 Research on Multi-precision Multiplication for Public Key Cryptography over Embedded Devices
Seo, Hwajeong;Kim, Howon; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.999-1007,
6 A Secure AES Implementation Method Resistant to Fault Injection Attack Using Differential Property Between Input and Output
Park, Jeong-Soo;Choi, Yong-Je;Choi, Doo-Ho;Ha, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1009-1017,
7 A fault attack on elliptic curve scalar multiplication based on Euclidean Addition Chain
Lee, Soo Jeong;Cho, Sung Min;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1019-1025,
8 An Analysis of the Security Threats and Security Requirements for Electric Vehicle Charging Infrastructure
Kang, Seong-Ku;Seo, Jung-Taek; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1027-1037,
9 A Study on National Cyber Capability Assessment Methodology
Kang, JungMin;Hwang, HyunUk;Lee, JongMoon;Yun, YoungTae;Bae, ByungChul;Jung, SoonYoung; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1039-1055,
10 A Message Authentication and Key Distribution Mechanism Secure Against CAN bus Attack
Cho, A-Ram;Jo, Hyo Jin;Woo, Samuel;Son, Young Dong;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1057-1068,
11 A detection mechanism for Jump-Oriented Programming at binary level
Kim, Ju-Hyuk;Lee, Yo-Ram;Oh, Soo-Hyun; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1069-1078,
12 Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis
Kim, Ji Hong;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1079-1090,
13 Analysis on Domestic and Foreign Privacy Information Acts to Suggest Directions for Developing Korean Privacy Information Protection Act
You, Han-Na;Kim, Hyung-Joo;Lee, Jae-Sik;Park, Tae-Sung;Jun, Moon-Seog; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1091-1102,
14 E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions
Choi, Jong-Uk;Lee, Yong-Jin;Park, Ju-Mi; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1103-1113,
15 Factor analysis of VoIP Security Checklists using AHP
Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1115-1122,
16 The effects of the operation of an information security management system on the performance of information security
Jang, Sang-Soo;Lee, Sang-Joon;Noh, Bong-Nam; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1123-1132,
17 A Study on development of evaluation indicators on the Managed Security Service(MSS)
Lee, Hyundo;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1133-1143,
18 Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism
Kim, Young-Dong;Kim, Ikhwan;Kim, Taehyoun; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1145-1157,
19 Precise control flow protection based on source code
Lee, JongHyup;Kim, Yong Seung; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1159-1168,
20 An analysis method for complex attack pattern using the coupling metrics
Kwon, Ye-Jin;Park, Young-Bom; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1169-1178,
21 An Improvement of the Guideline of Secure Software Development for Korea E-Government
Han, Kyung Sook;Kim, Taehwan;Han, Ki Young;Lim, Jae Myung;Pyo, Changwoo; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1179-1189,
22 Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems
Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1191-1204,
23 Analyzing Secure Coding Initiatives: An Ecosystem Approach
Kim, Sung Kun;Lee, Jae-Il; / Korea Institute of Information Security and Cryptology , v.22, no.5, pp.1205-1216,