Browse > Article List

논문
1 A LEA Implementation study on UICC-16bit
Kim, Hyun-Il;Park, Cheolhee;Hong, Dowon;Seo, Changho; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.585-592,
2 Research on efficient HW/SW co-design method of light-weight cryptography using GEZEL
Kim, Sung-Gon;Kim, Hyun-Min;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.593-605,
3 2D - 3D Human Face Verification System based on Multiple RGB-D Camera using Head Pose Estimation
Kim, Jung-Min;Li, Shengzhe;Kim, Hak-Il; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.607-616,
4 Efficient Malware Detector for Android Devices
Lee, Hye Lim;Jang, Soohee;Yoon, Ji Won; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.617-624,
5 A mechanism for end-to-end secure communication in heterogeneous tactical networks
Park, Cheol-Yong;Kim, Ki-Hong;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.625-634,
6 A Study on Protecting for forgery modification of User-input on Webpage
Yu, Chang-Hun;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.635-643,
7 Discrimination of SPAM and prevention of smishing by sending personally identified SMS(For financial sector)
Joo, Choon Kyong;Yoon, Ji Won; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.645-653,
8 A study for improving database recovery ratio of Disaster Recovery System in financial industry
Kim, Jin-Ho;Seo, Dong-Kyun;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.655-667,
9 A Business-Logic Separated Security Framework for Smart Banking
Seo, Dong-Hyun;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.669-679,
10 A Study on IT Outsourcing Policy Based on Operational Risks of Financial Industries
Choi, Chang-Lai;Yun, Jang-Ho;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.681-694,
11 Determinants of Willingness To Pay for Personal Information Protection
You, Seung Dong;Yoo, Jinho; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.695-703,
12 A Study on Application Structure for IT Operational Risk in Financial Institute
Cho, Seong-Cheol;Nam, Cho-Yee;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.705-719,
13 A Study on Reforming the National Personal Identification Number System : The Unconnected Random Personal Identification Number System
Han, Mun-Jung;Jang, GyeHyun;Hong, Seokhie;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.721-737,
14 An Efficient-keyword-searching Technique over Encrypted data on Smartphone Database
Kim, Jong-Seok;Choi, Won-Suk;Park, Jin-Hyung;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.739-751,
15 An Efficient New Format-Preserving Encryption Algorithm to encrypt the Personal Information
Song, Kyung-Hwan;Kang, Hyung-Chul;Sung, Jae-Chul; / Korea Institute of Information Security and Cryptology , v.24, no.4, pp.753-763,