Browse > Article List

논문
1 Practical Conjunctive Searchable Encryption Using Prime Table
Yang, Yu-Jin;Kim, Sangjin; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.5-14,
2 SEED and ARIA algorithm design methods using GEZEL
Kwon, TaeWoong;Kim, Hyunmin;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.15-29,
3 The Secure Key Store to prevent leakage accident of a Private Key and a Certificate
Park, Young-Jin;Kim, Seon-Jong;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.31-40,
4 Fault Detection Architecture of the Field Multiplication Using Gaussian Normal Bases in GF(2n
Kim, Chang Han;Chang, Nam Su;Park, Young Ho; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.41-50,
5 A Segmented Leap-Ahead LFSR Pseudo-Random Number Generator
Park, Young-Kyu;Kim, Sang-Choon;Lee, Je-Hoon; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.51-58,
6 Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service
Kwon, Keun;Jung, Youngman;Jung, Jaewook;Choi, Younsung;Jeon, Woongryul;Won, Dongho; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.59-74,
7 Building More Secure Femtocell with Improved Proxy Signature
Choi, Hyoung-Kee;Han, Chan-Kyu;Kim, Seung-Ryong; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.75-86,
8 Detecting Rogue AP using k-SVM method
Lee, Jae-Wook;Lee, Si-Young;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.87-95,
9 Technical and Managerial Requirements for Privacy Protection Using Face Detection and Recognition in CCTV Systems
Shin, Yong-Nyuo;Chun, Myung Geun; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.97-106,
10 A Study on Unknown Malware Detection using Digital Forensic Techniques
Lee, Jaeho;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.107-122,
11 Digital Forensic Investigation of MongoDB
Yoon, Jong-Seong;Jung, Doo-Won;Kang, Chul-Hoon;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.123-134,
12 The analysis of Windows 7·8 IconCache.db and its application
Lee, Chan-Youn;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.135-144,
13 Andro-profiler: Anti-malware system based on behavior profiling of mobile malware
Yun, Jae-Sung;Jang, Jae-Wook;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.145-154,
14 A Study on Fake Data Filtering Method of CCN
Kim, DaeYoub; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.155-163,
15 A Hierarchical Authentication for Proxy Mobile IPv6 Networks
Kim, KyungJoon;Baek, JaeJong;Song, JooSeok; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.165-170,
16 How to Combine Secure Software Development Lifecycle into Common Criteria
Park, Jinseok;Kang, Heesoo;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.171-182,
17 The Impact of Privacy Policy Layout on Users' Information Recognition
Ko, Yumi;Choi, Jaewon;Kim, Beomsoo; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.183-193,
18 A Study on the Curriculum of Department of Information Security in Domestic Universities and Graduate Schools and Comparison with the Needs of Industry Knowledge
Kim, Min-Jeong;Lee, Haeni;Song, Shin-Jeong;Yoo, Jinho; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.195-205,
19 A study on the influence of information security in selecting smart-phone
Ahn, Jong-Chang;Lee, Seung-Won;Lee, Ook;Cho, Sung-Phil; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.207-214,
20 Detection of invalidated sanity checks caused by undefined behaviors
Lee, JongHyup; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.215-219,
21 Second-Order G-equivariant Logic Gate for AND Gate and its Application to Secure AES Implementation
Baek, Yoo-Jin;Choi, Doo-Ho; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.221-227,
22 Implementing Side Channel Analysis Evaluation Boards of KLA-SCARF system
Choi, YongJe;Choi, DooHo;Ryou, JeaCheol; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.229-240,
23 Guidelines for Safe and Reliable PUF Implementation
Lee, Donggeon;Lee, Yeonchoel;Kim, Kyunghoon;Park, Jong-Gyu;Choi, Yong-Je;Kim, Howon; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.241-259,
24 A New Simple Power Analysis Attack on the m-ary Exponentiation Implementation
Ahn, Sung-Jun;Choi, Doo-Ho;Ha, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.24, no.1, pp.261-269,