|
1 |
A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack
Kim, Hyun-Jin;Lee, Im-Yeong;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.769-780,
|
|
2 |
A Method for Detection of Private Key Compromise
Park, Moon-Chan;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.781-793,
|
|
3 |
A Secure and Privacy-Aware Route Tracing and Revocation Mechanism in VANET-based Clouds
Hussain, Rasheed;Oh, Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.795-807,
|
|
4 |
An Analysis on the Error Probability of A Bloom Filter
Kim, SungYong;Kim, JiHong;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.809-815,
|
|
5 |
A Study on SQL Performance-Based IT Application Change Management Process to Prevent Failures of Online Transactions
Kim, Jeong-Hwan;Ko, Moo-Seong;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.817-838,
|
|
6 |
Host based Feature Description Method for Detecting APT Attack
Moon, Daesung;Lee, Hansung;Kim, Ikkyun;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.839-850,
|
|
7 |
Study on Smart TV Forensics
Kang, Hee-Soo;Park, Min-Su;Kim, Seung-Joo;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.851-860,
|
|
8 |
An improved extraction technique of executable file from physical memory by analyzing file object
Kang, Youngbok;Hwang, Hyunuk;Kim, Kibom;Noh, Bongnam;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.861-870,
|
|
9 |
Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response
Kim, Kyu-Il;Choi, Sang-Soo;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.871-883,
|
|
10 |
The Research on the Recovery Techniques of Deleted Files in the XFS Filesystem
Ahn, Jae-Hyoung;Park, Jung-Heum;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.885-896,
|
|
11 |
A study on extraction of optimized API sequence length and combination for efficient malware classification
Choi, Ji-Yeon;Kim, HeeSeok;Kim, Kyu-Il;Park, Hark-Soo;Song, Jung-Suk;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.897-909,
|
|
12 |
A Study on The Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs
Park, Kyeong-Tae;Kim, Sehun;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.911-918,
|
|
13 |
A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System
Lee, Choong-Cheang;Kim, Jin;Lee, Chung-Hun;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.919-929,
|
|
14 |
Mobile Payment System Design with Transaction Certificate Mode
Sung, Soon-Hwa;Ryou, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.931-939,
|
|
15 |
A Survey of applying Fully Homomorphic Encryption in the Cloud system
Kim, Sehwan;Yoon, Hyunsoo;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.941-949,
|
|
16 |
An Empirical Study on the Obstacle Factors of ISMS Certification Using Exploratory Factor Analysis
Park, Kyeong-Tae;Kim, Sehun;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.951-959,
|
|
17 |
Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)
Chae, Hyun Tak;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.961-968,
|
|
18 |
Refining software vulnerbility Analysis under ISO/IEC 15408 and 18045
Im, Jae-Woo;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.969-974,
|
|
19 |
A Study on Smishing Block of Android Platform Environment
Lee, Si-Young;Kang, Hee-Soo;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.975-985,
|
|
20 |
A Study on Efficient Design of PUF-Based RFID Authentication Protocol
Byun, Jin Wook;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.987-999,
|
|
21 |
Analysis of Security Requirements on DCU and Development Protection Profile based on Common Criteria Version 3.1
Cho, Youngjun;Kim, Sinkyu;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.1001-1011,
|
|
22 |
A Study on CPA Performance Enhancement using the PCA
Baek, Sang-Su;Jang, Seung-Kyu;Park, Aesun;Han, Dong-Guk;Ryou, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.24, no.5, pp.1013-1022,
|
|