|
1 |
Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN
Choi, Jin-Ho;Oh, Soohyun;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1219-1230,
|
|
2 |
Construction of an Asymmetric Traitor Tracing Schemes with Anonymity
Lee, Moonsik;Kang, SunBu;Lee, Juhee;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1231-1242,
|
|
3 |
STM-GOMS Model: A Security Model for Authentication Schemes in Mobile Smart Device Environments
Shin, Sooyeon;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1243-1252,
|
|
4 |
A Ternary Tree-based Authenticated Group Key Agreement For Dynamic Peer Group
Kim, Ho-Hee;Kim, Soon-Ja;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1253-1263,
|
|
5 |
Closest Vector Problem Based Interactive Proof
Lee, Kyunghee;Nyang, DaeHun;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1265-1270,
|
|
6 |
Location-Based Authentication Mechanism for Server Access Control
Choi, Jung Min;Cho, Kwantae;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1271-1282,
|
|
7 |
Privacy Protection and Non-repudiation Mechanisms for Parcel Service
Choi, Min Seok;Cho, Kwantae;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1283-1292,
|
|
8 |
An OpenAPI based Security Framework for Privacy Protection in Social Network Service Environment
Yoon, Yongseok;Kim, Kangseok;Shon, Taeshik;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1293-1300,
|
|
9 |
A case study on the performance of encrypted data
Hong, Jung Hwa;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1301-1313,
|
|
10 |
A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns
Chang, Beom-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1315-1324,
|
|
11 |
Research on the Classification Model of Similarity Malware using Fuzzy Hash
Park, Changwook;Chung, Hyunji;Seo, Kwangseok;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1325-1336,
|
|
12 |
Research on Secure Card-Payment System of Social Commerce
Heo, Wonseok;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1337-1344,
|
|
13 |
Vulnerability Analysis Method of Software-based Secure USB
Kim, Minho;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo;Kim, Minsu;Noh, Bongnam;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1345-1354,
|
|
14 |
A Study on ACAS for Enhanced Security in Cloud Virtualization Internal Environment
Park, Tae-Sung;Choi, Do-Hyeon;Do, Kyoung-Hwa;Jun, Moon-Seog;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1355-1362,
|
|
15 |
Forensic Investigation Procedure for Real-time Synchronization Service
Lee, Jeehee;Jung, Hyunji;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1363-1374,
|
|
16 |
Evaluation Criteria for Korean Smart Grid based on K-ISMS
Kim, Kichul;Kim, Seungjoo;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1375-1391,
|
|
17 |
A Feasibility Study on Introduction of Information Security Disclosure
Jun, Hyo-Jung;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1393-1405,
|
|
18 |
Quantitative Scoring Criteria on the Importance of Software Weaknesses
Ahn, Joonseon;Bang, Ji-Ho;Lee, Eunyoung;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1407-1417,
|
|
19 |
The Online Privacy Policy: Recognition, Confirmation and its Effects on Online Transaction Behavior
Jang, Wonchang;Shin, Ilsoon;
/
Korea Institute of Information Security and Cryptology
, v.22, no.6, pp.1419-1427,
|
|