Browse > Article List

논문
1 A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme
Son, Junggab;Oh, Heekuck;Kim, SangJin; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.147-155,
2 Dynamic User Reliability Evaluation Scheme for Social Network Service
Lee, Changhoon;Jung, Youngman;Jung, Jaewook;Won, Dongho; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.157-168,
3 An Efficient User Authentication Scheme with Mobile Device in Wireless Network Environment
Shin, Soobok;Yeh, Hongjin;Kim, Kangseok; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.169-179,
4 A system for detecting document leakage by insiders through continuous user authentication by using document reading behavior
Cho, Sungyoung;Kim, Minsu;Won, Jongil;Kwon, SangEun;Lim, Chaeho;Kang, Brent ByungHoon;Kim, Sehun; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.181-192,
5 Methodology for digital investigation of illegal sharing using BitTorrent
Park, Soo-Young;Chung, Hyun-Ji;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.193-201,
6 Digital Forensic Investigation of Virtual Desktop Infrastructure
Jang, Sanghee;Kim, Deunghwa;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.203-212,
7 An analysis of vulnerability and the method to secure on Android SNS applications from alteration of the code segments
Lee, Sang Ho;Ju, Da Young; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.213-221,
8 Integrity verification of VM data collected in private cloud environment and reliability verification of related forensic tools
Kim, Deunghwa;Jang, Sanghee;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.223-230,
9 A Length-based File Fuzzing Test Suite Reduction Algorithm for Evaluation of Software Vulnerability
Lee, Jaeseo;Kim, Jong-Myong;Kim, SuYong;Yun, Young-Tae;Kim, Yong-Min;Noh, Bong-Nam; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.231-242,
10 Nuclear-related Software analysis based on secure coding
Jung, Da-Hye;Choi, Jin-Young;Lee, Song-Hee; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.243-250,
11 A Security Evaluation Criteria for Korean Cloud Computing Service
Kim, Kichul;Heo, Ok;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.251-265,
12 A Security Hole in Comparable Encryption
Kim, Sangjin;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.267-271,
13 Research on Advanced Electronic Records Management Technology Using Digital Forensics
Yoo, Hyunguk;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.273-277,
14 Study on Availability Guarantee Mechanism on Smart Grid Networks: Detection of Attack and Anomaly Node Using Signal Information
Kim, Mihui; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.279-286,
15 A Study on Security Evaluation Methodology for Industrial Control Systems
Choi, Myeonggil; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.287-298,
16 Reply-Type based Agent Generation of Legacy Service on One-way data transfer system
Kim, Kyoung-Ho;Chang, Yeop;Kim, Hee-Min;Yun, Jeong-Han;Kim, Woo-Nyon; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.299-305,
17 SG-RBAC : Role Based Access Control Model for Smart Grid Environment
Lee, Woomyo;Lee, Gunhee;Kim, Sinkyu;Seo, Jungtaek; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.307-318,
18 Digital Evidence Acquisition Scheme using the Trusted Third Party in Smart Grid Infrastructure
Cho, Youngjun;Choi, Jaeduck;Kim, Sinkyu;Seo, Jungtaek; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.319-328,
19 Classification of ICS abnormal behavior in terms of security
Na, Jung-Chan;Cho, Hyun-Sook; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.329-337,
20 Development of Low Latency Secure Communication Device for Legacy SCADA
Choi, Moon-Suk;Kim, Chung-Hyo;Lim, You-Seok;Ju, Seong-Ho;Lim, Yong-Hun;Jeon, Kyung-Seok; / Korea Institute of Information Security and Cryptology , v.23, no.2, pp.339-346,