|
1 |
A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme
Son, Junggab;Oh, Heekuck;Kim, SangJin;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.147-155,
|
|
2 |
Dynamic User Reliability Evaluation Scheme for Social Network Service
Lee, Changhoon;Jung, Youngman;Jung, Jaewook;Won, Dongho;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.157-168,
|
|
3 |
An Efficient User Authentication Scheme with Mobile Device in Wireless Network Environment
Shin, Soobok;Yeh, Hongjin;Kim, Kangseok;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.169-179,
|
|
4 |
A system for detecting document leakage by insiders through continuous user authentication by using document reading behavior
Cho, Sungyoung;Kim, Minsu;Won, Jongil;Kwon, SangEun;Lim, Chaeho;Kang, Brent ByungHoon;Kim, Sehun;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.181-192,
|
|
5 |
Methodology for digital investigation of illegal sharing using BitTorrent
Park, Soo-Young;Chung, Hyun-Ji;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.193-201,
|
|
6 |
Digital Forensic Investigation of Virtual Desktop Infrastructure
Jang, Sanghee;Kim, Deunghwa;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.203-212,
|
|
7 |
An analysis of vulnerability and the method to secure on Android SNS applications from alteration of the code segments
Lee, Sang Ho;Ju, Da Young;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.213-221,
|
|
8 |
Integrity verification of VM data collected in private cloud environment and reliability verification of related forensic tools
Kim, Deunghwa;Jang, Sanghee;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.223-230,
|
|
9 |
A Length-based File Fuzzing Test Suite Reduction Algorithm for Evaluation of Software Vulnerability
Lee, Jaeseo;Kim, Jong-Myong;Kim, SuYong;Yun, Young-Tae;Kim, Yong-Min;Noh, Bong-Nam;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.231-242,
|
|
10 |
Nuclear-related Software analysis based on secure coding
Jung, Da-Hye;Choi, Jin-Young;Lee, Song-Hee;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.243-250,
|
|
11 |
A Security Evaluation Criteria for Korean Cloud Computing Service
Kim, Kichul;Heo, Ok;Kim, Seungjoo;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.251-265,
|
|
12 |
A Security Hole in Comparable Encryption
Kim, Sangjin;Oh, Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.267-271,
|
|
13 |
Research on Advanced Electronic Records Management Technology Using Digital Forensics
Yoo, Hyunguk;Shon, Taeshik;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.273-277,
|
|
14 |
Study on Availability Guarantee Mechanism on Smart Grid Networks: Detection of Attack and Anomaly Node Using Signal Information
Kim, Mihui;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.279-286,
|
|
15 |
A Study on Security Evaluation Methodology for Industrial Control Systems
Choi, Myeonggil;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.287-298,
|
|
16 |
Reply-Type based Agent Generation of Legacy Service on One-way data transfer system
Kim, Kyoung-Ho;Chang, Yeop;Kim, Hee-Min;Yun, Jeong-Han;Kim, Woo-Nyon;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.299-305,
|
|
17 |
SG-RBAC : Role Based Access Control Model for Smart Grid Environment
Lee, Woomyo;Lee, Gunhee;Kim, Sinkyu;Seo, Jungtaek;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.307-318,
|
|
18 |
Digital Evidence Acquisition Scheme using the Trusted Third Party in Smart Grid Infrastructure
Cho, Youngjun;Choi, Jaeduck;Kim, Sinkyu;Seo, Jungtaek;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.319-328,
|
|
19 |
Classification of ICS abnormal behavior in terms of security
Na, Jung-Chan;Cho, Hyun-Sook;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.329-337,
|
|
20 |
Development of Low Latency Secure Communication Device for Legacy SCADA
Choi, Moon-Suk;Kim, Chung-Hyo;Lim, You-Seok;Ju, Seong-Ho;Lim, Yong-Hun;Jeon, Kyung-Seok;
/
Korea Institute of Information Security and Cryptology
, v.23, no.2, pp.339-346,
|
|