Browse > Article List

논문
1 A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos
Park, So Hyeon;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.803-813,
2 Recent Trends in Implementing Cryptography with Embedded Microprocessors
Seo, Hwa-Jeong;Kim, Howon; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.815-824,
3 The Vulnerability Analysis of CA Arcot VPS
Lee, Sang-Ho;Kim, Sung-Ho;Nyang, Dea-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.825-830,
4 Secure Authentication Protocol in Hadoop Distributed File System based on Hash Chain
Jeong, So Won;Kim, Kee Sung;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.831-847,
5 Efficient File System Level Encryption Mechanism Using HSM
Kang, Cheol-Oh;Won, Jong-Jin;Park, Sung-Jin;Ryou, Jea-Cheol; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.849-858,
6 Secure classical RSA Cryptosystem against Fault Injection Attack based on Fermat's Theorem
Seo, Gae Won;Baek, Yoo Jin;Kim, Sung Kyoung;Kim, Tae Won;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.859-865,
7 The Analysis of Event-based Jitter Buffer Algorithm
Choi, Seung-Han;Park, Jong-Min;Seo, Chang-Ho; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.867-871,
8 Security Threat Evaluation for Smartgrid Control System
Ko, Jongbin;Lee, Seokjun;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.873-883,
9 An Group-based Security Protocol for Machine Type Communications in LTE-Advanced
Choi, Dae-Sung;Choi, Hyoung-Kee; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.885-896,
10 A framework of management for preventing illegal distribution of pdf bookscan file
Lee, Kuk-Heon;Chung, Hyun-Ji;Ryu, Dae-Gull;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.897-907,
11 Analysis of Naver CAPTCHA with Effective Segmentation
Nyang, Dae Hun;Choi, Yong Heon;Hong, Seok Jun;Lee, Kyunghee; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.909-917,
12 The Sub Authentication Method For Driver Using Driving Patterns
Jeong, Jong-Myoung;Kang, Hyung Chul;Jo, Hyo Jin;Yoon, Ji Won;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.919-929,
13 A kernel memory collecting method for efficent disk encryption key search
Kang, Youngbok;Hwang, Hyunuk;Kim, Kibom;Lee, Kyoungho;Kim, Minsu;Noh, Bongnam; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.931-938,
14 Anomaly Detection for IEC 61850 Substation Network
Lim, Yong-Hun;Yoo, Hyunguk;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.939-946,
15 The method of recovery for deleted record in Oracle Database
Choi, Jong-Hyun;Jeong, Doo Won;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.947-955,
16 A Study of Performance Improvement of Two Dimensional FEC Schemes For Data Security
Min, Sun-Ho; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.957-962,
17 The Study of Performance Improvement of Dejitter Algorithm applying Time Series Model for VoicePlatform Security Data
Min, Sun-Ho;Seo, Chang-Ho; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.963-968,
18 A study on the security policy improvement using the big data
Kim, Song-Young;Kim, Joseph;Lim, Jong-In;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.969-976,
19 Personal Information Exposure on Social Network Service
Choi, Daeseon;Kim, Seok Hyun;Cho, Jin-Man;Jin, Seung-Hun;Cho, Hyun-Sook; / Korea Institute of Information Security and Cryptology , v.23, no.5, pp.977-983,