Browse > Article List

논문
1 Efficient Implementation of Crypto Processing Based on Pre_Buffered Key Stream Method
Kang, Cheol-Oh;Kim, Eun-Chan;Park, Jea-Min;Ryou, Jea-Cheol; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.989-1000,
2 Study for Injurious Multimedia Contents Analysis Mechanism in Smart Devices
Min, Sun-Ho;Kim, Seok-Woo;Ha, Kyeoung-Ju;Seo, Chang-Ho; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1001-1006,
3 A Study on Structural Vulnerability of MobilePhone Micropayment System And Improvement of Standard Payment Module for User Protection
Park, Kwang Sun;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1007-1015,
4 Weakness of Andriod Smartphone Applications against Electromagnetic Analsysis
Park, JeaHoon;Kim, Soo Hyeon;Han, Daewan; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1017-1023,
5 Study on Dynamic Trust-based Access Control in Online Social Network Environment
Baek, Seungsoo;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1025-1035,
6 Study on Anti-Phishing Solutions, Related Researches and Future Directions
Shin, Ji Sun; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1037-1047,
7 On Security of Android Smartphone Apps Employing Cryptography
Park, Sang-Ho;Kim, Hyeonjin;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1049-1055,
8 A Method of Internal Information Acquisition of Smartphones
Lee, Yunho;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1057-1067,
9 Applying CBR algorithm for cyber infringement profiling system
Han, Mee Lan;Kim, Deok Jin;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1069-1086,
10 The Reliability Evaluation of User Account on Facebook
Park, Jeongeun;Park, Minsu;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1087-1101,
11 A Method of Identifying Ownership of Personal Information exposed in Social Network Service
Kim, Seok-Hyun;Cho, Jin-Man;Jin, Seung-Hun;Choi, Dae-Seon; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1103-1110,
12 SVC and CAS Combining Scheme for Support Multi-Device Watching Environment
Son, Junggab;Oh, Heekuck;Kim, SangJin; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1111-1120,
13 Multi-Level Emulation for Malware Distribution Networks Analysis
Choi, Sang-Yong;Kang, Ik-Seon;Kim, Dae-Hyeok;Noh, Bong-Nam;Kim, Yong-Min; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1121-1129,
14 An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment
Lee, Jaekyung;Son, Junggab;Kim, Hunmin;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1131-1141,
15 A study on vulnerabilities of serial based DNP in power control fields
Jang, Ji Woong;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1143-1156,
16 The danger and vulnerability of eavesdropping by using loud-speakers
Lee, Seung Joon;Ha, Young Mok;Jo, Hyun Ju;Yoon, Ji Won; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1157-1167,
17 Research on the Trend of Utilizing Emulab as Cyber Security Research Framework
Lee, Man-Hee;Seok, Woo-Jin; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1169-1180,
18 Development of Intrusion Detection System for GOOSE Protocol Based on the Snort
Kim, Hyeong-Dong;Kim, Ki-Hyun;Ha, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1181-1190,
19 Secure Mobile Query in Wireless Sensor Networks
Lim, Chae Hoon; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1191-1197,
20 Measuring method of personal information leaking risk factor to prevent leak of personal information in SNS
Cheon, Myung-Ho;Choi, Jong-Seok;Shin, Yong-Tae; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1199-1206,
21 Information Security Investment and Security Breach: Empirical Study on the Reverse Causality
Shin, Ilsoon;Jang, Wonchang;Park, Heeyoung; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1207-1217,
22 A Rolling Image based Virtual Keyboard Resilient to Spyware on Smartphones
Na, Sarang;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1219-1223,
23 A Study of Multiple Password Leakage Factors Caused by Phishing and Pharming Attacks
Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1225-1229,
24 Strengthening Security on the Internal Cloud Service Certification
Lee, Gangshin; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1231-1238,
25 A study on the vulnerability of the Cloud computing security
Jeon, Jeong-Hoon; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1239-1246,
26 Proposal of Security Requirements for the Cloud Storage Virtualization System
Yeo, Youngmin;Lee, Chanwoo;Moon, Jongsub; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1247-1257,
27 A Study on the Secure Database Controlled Under Cloud Environment
Kim, SungYong;Kim, Ji-Hong; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1259-1266,
28 A Study on PIMS Controls for PII Outsourcing Management under the Cloud Service Environment
Park, Dae-Ha;Han, Keun-Hee; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1267-1276,
29 A Research on the Cloud Computing Security Framework
kim, Jung-Duk;Lee, Seong-Il; / Korea Institute of Information Security and Cryptology , v.23, no.6, pp.1277-1286,