Browse > Article List

논문
1 A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack
Kim, Hyun-Jin;Lee, Im-Yeong; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.769-780,
2 A Method for Detection of Private Key Compromise
Park, Moon-Chan;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.781-793,
3 A Secure and Privacy-Aware Route Tracing and Revocation Mechanism in VANET-based Clouds
Hussain, Rasheed;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.795-807,
4 An Analysis on the Error Probability of A Bloom Filter
Kim, SungYong;Kim, JiHong; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.809-815,
5 A Study on SQL Performance-Based IT Application Change Management Process to Prevent Failures of Online Transactions
Kim, Jeong-Hwan;Ko, Moo-Seong;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.817-838,
6 Host based Feature Description Method for Detecting APT Attack
Moon, Daesung;Lee, Hansung;Kim, Ikkyun; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.839-850,
7 Study on Smart TV Forensics
Kang, Hee-Soo;Park, Min-Su;Kim, Seung-Joo; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.851-860,
8 An improved extraction technique of executable file from physical memory by analyzing file object
Kang, Youngbok;Hwang, Hyunuk;Kim, Kibom;Noh, Bongnam; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.861-870,
9 Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response
Kim, Kyu-Il;Choi, Sang-Soo;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.871-883,
10 The Research on the Recovery Techniques of Deleted Files in the XFS Filesystem
Ahn, Jae-Hyoung;Park, Jung-Heum;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.885-896,
11 A study on extraction of optimized API sequence length and combination for efficient malware classification
Choi, Ji-Yeon;Kim, HeeSeok;Kim, Kyu-Il;Park, Hark-Soo;Song, Jung-Suk; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.897-909,
12 A Study on The Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs
Park, Kyeong-Tae;Kim, Sehun; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.911-918,
13 A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System
Lee, Choong-Cheang;Kim, Jin;Lee, Chung-Hun; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.919-929,
14 Mobile Payment System Design with Transaction Certificate Mode
Sung, Soon-Hwa;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.931-939,
15 A Survey of applying Fully Homomorphic Encryption in the Cloud system
Kim, Sehwan;Yoon, Hyunsoo; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.941-949,
16 An Empirical Study on the Obstacle Factors of ISMS Certification Using Exploratory Factor Analysis
Park, Kyeong-Tae;Kim, Sehun; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.951-959,
17 Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)
Chae, Hyun Tak;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.961-968,
18 Refining software vulnerbility Analysis under ISO/IEC 15408 and 18045
Im, Jae-Woo; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.969-974,
19 A Study on Smishing Block of Android Platform Environment
Lee, Si-Young;Kang, Hee-Soo;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.975-985,
20 A Study on Efficient Design of PUF-Based RFID Authentication Protocol
Byun, Jin Wook; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.987-999,
21 Analysis of Security Requirements on DCU and Development Protection Profile based on Common Criteria Version 3.1
Cho, Youngjun;Kim, Sinkyu; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.1001-1011,
22 A Study on CPA Performance Enhancement using the PCA
Baek, Sang-Su;Jang, Seung-Kyu;Park, Aesun;Han, Dong-Guk;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.24, no.5, pp.1013-1022,