|
1 |
Security Analysis on Digital Signature Function Implemented in Electronic Documents Software
Park, Sunwoo;Lee, Changbin;Lee, Kwangwoo;Kim, Jeeyeon;Lee, Youngsook;Won, Dongho;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.945-957,
|
|
2 |
Study of Local Linkability based on Modified Linear Encryption in Group Signature Schemes
Kang, Jeonil;Kim, Kitae;Nyang, DaeHun;Lee, KyungHee;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.959-974,
|
|
3 |
Exception Management of Well-behaved Users in Group Signature Schemes based on Linear Encryption
Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.975-985,
|
|
4 |
Software integrity verification method in POS system
Cho, Sung-A;Kim, Sung Hoon;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.987-997,
|
|
5 |
Research on Multi-precision Multiplication for Public Key Cryptography over Embedded Devices
Seo, Hwajeong;Kim, Howon;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.999-1007,
|
|
6 |
A Secure AES Implementation Method Resistant to Fault Injection Attack Using Differential Property Between Input and Output
Park, Jeong-Soo;Choi, Yong-Je;Choi, Doo-Ho;Ha, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1009-1017,
|
|
7 |
A fault attack on elliptic curve scalar multiplication based on Euclidean Addition Chain
Lee, Soo Jeong;Cho, Sung Min;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1019-1025,
|
|
8 |
An Analysis of the Security Threats and Security Requirements for Electric Vehicle Charging Infrastructure
Kang, Seong-Ku;Seo, Jung-Taek;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1027-1037,
|
|
9 |
A Study on National Cyber Capability Assessment Methodology
Kang, JungMin;Hwang, HyunUk;Lee, JongMoon;Yun, YoungTae;Bae, ByungChul;Jung, SoonYoung;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1039-1055,
|
|
10 |
A Message Authentication and Key Distribution Mechanism Secure Against CAN bus Attack
Cho, A-Ram;Jo, Hyo Jin;Woo, Samuel;Son, Young Dong;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1057-1068,
|
|
11 |
A detection mechanism for Jump-Oriented Programming at binary level
Kim, Ju-Hyuk;Lee, Yo-Ram;Oh, Soo-Hyun;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1069-1078,
|
|
12 |
Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis
Kim, Ji Hong;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1079-1090,
|
|
13 |
Analysis on Domestic and Foreign Privacy Information Acts to Suggest Directions for Developing Korean Privacy Information Protection Act
You, Han-Na;Kim, Hyung-Joo;Lee, Jae-Sik;Park, Tae-Sung;Jun, Moon-Seog;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1091-1102,
|
|
14 |
E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions
Choi, Jong-Uk;Lee, Yong-Jin;Park, Ju-Mi;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1103-1113,
|
|
15 |
Factor analysis of VoIP Security Checklists using AHP
Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1115-1122,
|
|
16 |
The effects of the operation of an information security management system on the performance of information security
Jang, Sang-Soo;Lee, Sang-Joon;Noh, Bong-Nam;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1123-1132,
|
|
17 |
A Study on development of evaluation indicators on the Managed Security Service(MSS)
Lee, Hyundo;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1133-1143,
|
|
18 |
Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism
Kim, Young-Dong;Kim, Ikhwan;Kim, Taehyoun;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1145-1157,
|
|
19 |
Precise control flow protection based on source code
Lee, JongHyup;Kim, Yong Seung;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1159-1168,
|
|
20 |
An analysis method for complex attack pattern using the coupling metrics
Kwon, Ye-Jin;Park, Young-Bom;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1169-1178,
|
|
21 |
An Improvement of the Guideline of Secure Software Development for Korea E-Government
Han, Kyung Sook;Kim, Taehwan;Han, Ki Young;Lim, Jae Myung;Pyo, Changwoo;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1179-1189,
|
|
22 |
Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems
Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1191-1204,
|
|
23 |
Analyzing Secure Coding Initiatives: An Ecosystem Approach
Kim, Sung Kun;Lee, Jae-Il;
/
Korea Institute of Information Security and Cryptology
, v.22, no.5, pp.1205-1216,
|
|