|
1 |
Security Analysis and Enhancement on Smart card-based Remote User Authentication Scheme Using Hash Function
Kim, Youngil;Won, Dongho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1027-1036,
|
|
2 |
A Verifiable Secret Sharing Scheme with no Secure Channels
Kim, Ho-Hee;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1037-1044,
|
|
3 |
A Side Channel Attack with Vibration Signal on Card Terminal
Jang, Soohee;Ha, Youngmok;Yoon, Jiwon;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1045-1053,
|
|
4 |
The Enhanced Power Analysis Using Linear Discriminant Analysis
Kang, Ji-Su;Kim, HeeSeok;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1055-1063,
|
|
5 |
Accelerated VPN Encryption using AES-NI
Jeong, Jin-Pyo;Hwang, Jun-Ho;Han, Keun-Hee;Kim, Seok-Woo;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1065-1078,
|
|
6 |
Privacy-Preserving Kth Element Score over Vertically Partitioned Data on Multi-Party
Hong, Jun Hee;Jung, Jay Yeol;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1079-1090,
|
|
7 |
Side-Channel Analysis Based on Input Collisions in Modular Multiplications and its Countermeasure
Choi, Yongje;Choi, Dooho;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1091-1102,
|
|
8 |
Chosen Plaintext Collision Attack Using the Blacklist
Kim, Eun-Hee;Kim, Tae-Won;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1103-1116,
|
|
9 |
Differential Fault Analysis of the Block Cipher LEA
Park, Myungseo;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1117-1127,
|
|
10 |
CAPTCHA Analysis using Convolution Filtering
Kim, Keun-Young;Shin, Dong-Oh;Lee, Kyung-Hee;Nyang, Dae-Hun;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1129-1138,
|
|
11 |
The Long Distance Face Recognition using Multiple Distance Face Images Acquired from a Zoom Camera
Moon, Hae-Min;Pan, Sung Bum;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1139-1145,
|
|
12 |
Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks
Hussain, Rasheed;Oh, Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1147-1157,
|
|
13 |
Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes
Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1159-1174,
|
|
14 |
Study on Security Vulnerabilities of Implicit Intents in Android
Jo, Min Jae;Shin, Ji Sun;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1175-1184,
|
|
15 |
A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response
Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1185-1195,
|
|
16 |
Design and implementation of the honeycomb structure visualization system for the effective security situational awareness of large-scale networks
Park, Jae-Beom;Kim, Huy-Kang;Kim, Eun-Jin;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1197-1213,
|
|
17 |
DDoS Attack Application Detection Method with Android Logging System
Choi, Seul-Ki;Hong, Min;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1215-1224,
|
|
18 |
A Study on Security Container to Prevent Data Leaks
Lee, Jong-Shik;Lee, Kyeong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1225-1241,
|
|
19 |
A Study on Improving the Electronic Financial Fraud Prevention Service: Focusing on an Analysis of Electronic Financial Fraud Cases in 2013
Jeong, Dae Yong;Lee, Kyung-Bok;Park, Tae Hyoung;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1243-1261,
|
|
20 |
Cyber Defense Analysis and Improvement of Military ecosystem with Information Security Industry
Baek, Jaejong;Moon, Byoung-Moo;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1263-1269,
|
|
21 |
Studies on the effect of information security investment executive
Jeong, Seong-Hoon;Yoon, Joon-Sub;Lim, Jong-In;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1271-1284,
|
|
22 |
A Study on Management of the Secret Data in Defense Information System (Focusing on Defense Ammunition Information System)
Yeo, Seong-Cheol;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1285-1292,
|
|
23 |
A Study on Data Security Control Model of the Test System in Financial Institutions
Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1293-1308,
|
|
24 |
A Study on Selection Factors of Consulting Company for the Certification of Information Security Management System
Park, Kyeong-Tae;Kim, Sehun;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1309-1318,
|
|
25 |
Study on Security Grade Classification of Financial Company Documents
Kang, Bu Il;Kim, Seung Joo;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1319-1328,
|
|
26 |
A Study on the Methodology in Classifying the Importance of Information System
Choi, Myeonggil;Cho, Kang-Rae;
/
Korea Institute of Information Security and Cryptology
, v.24, no.6, pp.1329-1335,
|
|