Browse > Article List

논문
1 An Improved One Round Authenticated Group Key Agreement
Kim, Ho-Hee;Kim, Soon-Ja; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.3-10,
2 A tamper resistance software mechanism using MAC function and dynamic link key
Park, Jae-Hong;Kim, Sung-Hoon;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.11-18,
3 Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone
Choi, Min Keun;Cho, Kwan Tae;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.19-32,
4 Privacy-Preserving k-Bits Inner Product Protocol
Lee, Sang Hoon;Kim, Kee Sung;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.33-43,
5 Identity-based Strong Designated Verifier Signature Scheme from Lattices
Noh, Geontae;Chun, Ji Young;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.45-56,
6 A Study on the Design and Implementation of an Digital Evidence Collection Application on Windows based computer
Lee, SeungWon;Roh, YoungSup;Han, Changwoo; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.57-67,
7 Collaborative security response by interworking between multiple security solutions
Kim, JiHoon;Lim, Jong In;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.69-79,
8 A method for the protection of the message in social network service(SNS) using access control and hash-chain
Jeong, Hanjae;Won, Dongho; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.81-88,
9 Economic Analysis on Effects of Cyber Information Security in Korea: Focused on Estimation of National Loss
Shin, Jin; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.89-96,
10 Study on the personal Information Retrieval of Smartphone Messenger Service
Kang, Sunghoon;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.97-107,
11 Control items modeling methodology to establish core technology management system and successfully operating suggestions for institutional improvement
Shin, Dong-Hyuk;Shim, Mina;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.109-126,
12 A Study in the Improvement and Analysis Problem of Privacy Impact Assessment Qualification Criteria: focus on Similarity Analysis between Similar Certificates and Certification System of Privacy Impact Assessment
Kim, Erang;Shim, Mina;Lim, Jong In; / Korea Institute of Information Security and Cryptology , v.23, no.1, pp.127-142,