Browse > Article List

논문
1 Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN
Choi, Jin-Ho;Oh, Soohyun; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1219-1230,
2 Construction of an Asymmetric Traitor Tracing Schemes with Anonymity
Lee, Moonsik;Kang, SunBu;Lee, Juhee; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1231-1242,
3 STM-GOMS Model: A Security Model for Authentication Schemes in Mobile Smart Device Environments
Shin, Sooyeon;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1243-1252,
4 A Ternary Tree-based Authenticated Group Key Agreement For Dynamic Peer Group
Kim, Ho-Hee;Kim, Soon-Ja; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1253-1263,
5 Closest Vector Problem Based Interactive Proof
Lee, Kyunghee;Nyang, DaeHun; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1265-1270,
6 Location-Based Authentication Mechanism for Server Access Control
Choi, Jung Min;Cho, Kwantae;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1271-1282,
7 Privacy Protection and Non-repudiation Mechanisms for Parcel Service
Choi, Min Seok;Cho, Kwantae;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1283-1292,
8 An OpenAPI based Security Framework for Privacy Protection in Social Network Service Environment
Yoon, Yongseok;Kim, Kangseok;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1293-1300,
9 A case study on the performance of encrypted data
Hong, Jung Hwa;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1301-1313,
10 A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns
Chang, Beom-Hwan; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1315-1324,
11 Research on the Classification Model of Similarity Malware using Fuzzy Hash
Park, Changwook;Chung, Hyunji;Seo, Kwangseok;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1325-1336,
12 Research on Secure Card-Payment System of Social Commerce
Heo, Wonseok;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1337-1344,
13 Vulnerability Analysis Method of Software-based Secure USB
Kim, Minho;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo;Kim, Minsu;Noh, Bongnam; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1345-1354,
14 A Study on ACAS for Enhanced Security in Cloud Virtualization Internal Environment
Park, Tae-Sung;Choi, Do-Hyeon;Do, Kyoung-Hwa;Jun, Moon-Seog; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1355-1362,
15 Forensic Investigation Procedure for Real-time Synchronization Service
Lee, Jeehee;Jung, Hyunji;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1363-1374,
16 Evaluation Criteria for Korean Smart Grid based on K-ISMS
Kim, Kichul;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1375-1391,
17 A Feasibility Study on Introduction of Information Security Disclosure
Jun, Hyo-Jung;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1393-1405,
18 Quantitative Scoring Criteria on the Importance of Software Weaknesses
Ahn, Joonseon;Bang, Ji-Ho;Lee, Eunyoung; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1407-1417,
19 The Online Privacy Policy: Recognition, Confirmation and its Effects on Online Transaction Behavior
Jang, Wonchang;Shin, Ilsoon; / Korea Institute of Information Security and Cryptology , v.22, no.6, pp.1419-1427,