|
1 |
An Improved One Round Authenticated Group Key Agreement
Kim, Ho-Hee;Kim, Soon-Ja;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.3-10,
|
|
2 |
A tamper resistance software mechanism using MAC function and dynamic link key
Park, Jae-Hong;Kim, Sung-Hoon;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.11-18,
|
|
3 |
Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone
Choi, Min Keun;Cho, Kwan Tae;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.19-32,
|
|
4 |
Privacy-Preserving k-Bits Inner Product Protocol
Lee, Sang Hoon;Kim, Kee Sung;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.33-43,
|
|
5 |
Identity-based Strong Designated Verifier Signature Scheme from Lattices
Noh, Geontae;Chun, Ji Young;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.45-56,
|
|
6 |
A Study on the Design and Implementation of an Digital Evidence Collection Application on Windows based computer
Lee, SeungWon;Roh, YoungSup;Han, Changwoo;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.57-67,
|
|
7 |
Collaborative security response by interworking between multiple security solutions
Kim, JiHoon;Lim, Jong In;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.69-79,
|
|
8 |
A method for the protection of the message in social network service(SNS) using access control and hash-chain
Jeong, Hanjae;Won, Dongho;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.81-88,
|
|
9 |
Economic Analysis on Effects of Cyber Information Security in Korea: Focused on Estimation of National Loss
Shin, Jin;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.89-96,
|
|
10 |
Study on the personal Information Retrieval of Smartphone Messenger Service
Kang, Sunghoon;Kim, Seungjoo;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.97-107,
|
|
11 |
Control items modeling methodology to establish core technology management system and successfully operating suggestions for institutional improvement
Shin, Dong-Hyuk;Shim, Mina;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.109-126,
|
|
12 |
A Study in the Improvement and Analysis Problem of Privacy Impact Assessment Qualification Criteria: focus on Similarity Analysis between Similar Certificates and Certification System of Privacy Impact Assessment
Kim, Erang;Shim, Mina;Lim, Jong In;
/
Korea Institute of Information Security and Cryptology
, v.23, no.1, pp.127-142,
|
|