|
1 |
A LEA Implementation study on UICC-16bit
Kim, Hyun-Il;Park, Cheolhee;Hong, Dowon;Seo, Changho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.585-592,
|
|
2 |
Research on efficient HW/SW co-design method of light-weight cryptography using GEZEL
Kim, Sung-Gon;Kim, Hyun-Min;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.593-605,
|
|
3 |
2D - 3D Human Face Verification System based on Multiple RGB-D Camera using Head Pose Estimation
Kim, Jung-Min;Li, Shengzhe;Kim, Hak-Il;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.607-616,
|
|
4 |
Efficient Malware Detector for Android Devices
Lee, Hye Lim;Jang, Soohee;Yoon, Ji Won;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.617-624,
|
|
5 |
A mechanism for end-to-end secure communication in heterogeneous tactical networks
Park, Cheol-Yong;Kim, Ki-Hong;Ryou, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.625-634,
|
|
6 |
A Study on Protecting for forgery modification of User-input on Webpage
Yu, Chang-Hun;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.635-643,
|
|
7 |
Discrimination of SPAM and prevention of smishing by sending personally identified SMS(For financial sector)
Joo, Choon Kyong;Yoon, Ji Won;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.645-653,
|
|
8 |
A study for improving database recovery ratio of Disaster Recovery System in financial industry
Kim, Jin-Ho;Seo, Dong-Kyun;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.655-667,
|
|
9 |
A Business-Logic Separated Security Framework for Smart Banking
Seo, Dong-Hyun;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.669-679,
|
|
10 |
A Study on IT Outsourcing Policy Based on Operational Risks of Financial Industries
Choi, Chang-Lai;Yun, Jang-Ho;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.681-694,
|
|
11 |
Determinants of Willingness To Pay for Personal Information Protection
You, Seung Dong;Yoo, Jinho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.695-703,
|
|
12 |
A Study on Application Structure for IT Operational Risk in Financial Institute
Cho, Seong-Cheol;Nam, Cho-Yee;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.705-719,
|
|
13 |
A Study on Reforming the National Personal Identification Number System : The Unconnected Random Personal Identification Number System
Han, Mun-Jung;Jang, GyeHyun;Hong, Seokhie;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.721-737,
|
|
14 |
An Efficient-keyword-searching Technique over Encrypted data on Smartphone Database
Kim, Jong-Seok;Choi, Won-Suk;Park, Jin-Hyung;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.739-751,
|
|
15 |
An Efficient New Format-Preserving Encryption Algorithm to encrypt the Personal Information
Song, Kyung-Hwan;Kang, Hyung-Chul;Sung, Jae-Chul;
/
Korea Institute of Information Security and Cryptology
, v.24, no.4, pp.753-763,
|
|