|
1 |
Practical Conjunctive Searchable Encryption Using Prime Table
Yang, Yu-Jin;Kim, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.5-14,
|
|
2 |
SEED and ARIA algorithm design methods using GEZEL
Kwon, TaeWoong;Kim, Hyunmin;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.15-29,
|
|
3 |
The Secure Key Store to prevent leakage accident of a Private Key and a Certificate
Park, Young-Jin;Kim, Seon-Jong;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.31-40,
|
|
4 |
Fault Detection Architecture of the Field Multiplication Using Gaussian Normal Bases in GF(2n
Kim, Chang Han;Chang, Nam Su;Park, Young Ho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.41-50,
|
|
5 |
A Segmented Leap-Ahead LFSR Pseudo-Random Number Generator
Park, Young-Kyu;Kim, Sang-Choon;Lee, Je-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.51-58,
|
|
6 |
Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service
Kwon, Keun;Jung, Youngman;Jung, Jaewook;Choi, Younsung;Jeon, Woongryul;Won, Dongho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.59-74,
|
|
7 |
Building More Secure Femtocell with Improved Proxy Signature
Choi, Hyoung-Kee;Han, Chan-Kyu;Kim, Seung-Ryong;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.75-86,
|
|
8 |
Detecting Rogue AP using k-SVM method
Lee, Jae-Wook;Lee, Si-Young;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.87-95,
|
|
9 |
Technical and Managerial Requirements for Privacy Protection Using Face Detection and Recognition in CCTV Systems
Shin, Yong-Nyuo;Chun, Myung Geun;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.97-106,
|
|
10 |
A Study on Unknown Malware Detection using Digital Forensic Techniques
Lee, Jaeho;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.107-122,
|
|
11 |
Digital Forensic Investigation of MongoDB
Yoon, Jong-Seong;Jung, Doo-Won;Kang, Chul-Hoon;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.123-134,
|
|
12 |
The analysis of Windows 7·8 IconCache.db and its application
Lee, Chan-Youn;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.135-144,
|
|
13 |
Andro-profiler: Anti-malware system based on behavior profiling of mobile malware
Yun, Jae-Sung;Jang, Jae-Wook;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.145-154,
|
|
14 |
A Study on Fake Data Filtering Method of CCN
Kim, DaeYoub;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.155-163,
|
|
15 |
A Hierarchical Authentication for Proxy Mobile IPv6 Networks
Kim, KyungJoon;Baek, JaeJong;Song, JooSeok;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.165-170,
|
|
16 |
How to Combine Secure Software Development Lifecycle into Common Criteria
Park, Jinseok;Kang, Heesoo;Kim, Seungjoo;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.171-182,
|
|
17 |
The Impact of Privacy Policy Layout on Users' Information Recognition
Ko, Yumi;Choi, Jaewon;Kim, Beomsoo;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.183-193,
|
|
18 |
A Study on the Curriculum of Department of Information Security in Domestic Universities and Graduate Schools and Comparison with the Needs of Industry Knowledge
Kim, Min-Jeong;Lee, Haeni;Song, Shin-Jeong;Yoo, Jinho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.195-205,
|
|
19 |
A study on the influence of information security in selecting smart-phone
Ahn, Jong-Chang;Lee, Seung-Won;Lee, Ook;Cho, Sung-Phil;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.207-214,
|
|
20 |
Detection of invalidated sanity checks caused by undefined behaviors
Lee, JongHyup;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.215-219,
|
|
21 |
Second-Order G-equivariant Logic Gate for AND Gate and its Application to Secure AES Implementation
Baek, Yoo-Jin;Choi, Doo-Ho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.221-227,
|
|
22 |
Implementing Side Channel Analysis Evaluation Boards of KLA-SCARF system
Choi, YongJe;Choi, DooHo;Ryou, JeaCheol;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.229-240,
|
|
23 |
Guidelines for Safe and Reliable PUF Implementation
Lee, Donggeon;Lee, Yeonchoel;Kim, Kyunghoon;Park, Jong-Gyu;Choi, Yong-Je;Kim, Howon;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.241-259,
|
|
24 |
A New Simple Power Analysis Attack on the m-ary Exponentiation Implementation
Ahn, Sung-Jun;Choi, Doo-Ho;Ha, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.24, no.1, pp.261-269,
|
|