Browse > Article List

논문
1 Security Analysis and Enhancement on Smart card-based Remote User Authentication Scheme Using Hash Function
Kim, Youngil;Won, Dongho; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1027-1036,
2 A Verifiable Secret Sharing Scheme with no Secure Channels
Kim, Ho-Hee; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1037-1044,
3 A Side Channel Attack with Vibration Signal on Card Terminal
Jang, Soohee;Ha, Youngmok;Yoon, Jiwon; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1045-1053,
4 The Enhanced Power Analysis Using Linear Discriminant Analysis
Kang, Ji-Su;Kim, HeeSeok;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1055-1063,
5 Accelerated VPN Encryption using AES-NI
Jeong, Jin-Pyo;Hwang, Jun-Ho;Han, Keun-Hee;Kim, Seok-Woo; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1065-1078,
6 Privacy-Preserving Kth Element Score over Vertically Partitioned Data on Multi-Party
Hong, Jun Hee;Jung, Jay Yeol;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1079-1090,
7 Side-Channel Analysis Based on Input Collisions in Modular Multiplications and its Countermeasure
Choi, Yongje;Choi, Dooho;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1091-1102,
8 Chosen Plaintext Collision Attack Using the Blacklist
Kim, Eun-Hee;Kim, Tae-Won;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1103-1116,
9 Differential Fault Analysis of the Block Cipher LEA
Park, Myungseo;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1117-1127,
10 CAPTCHA Analysis using Convolution Filtering
Kim, Keun-Young;Shin, Dong-Oh;Lee, Kyung-Hee;Nyang, Dae-Hun; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1129-1138,
11 The Long Distance Face Recognition using Multiple Distance Face Images Acquired from a Zoom Camera
Moon, Hae-Min;Pan, Sung Bum; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1139-1145,
12 Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks
Hussain, Rasheed;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1147-1157,
13 Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes
Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1159-1174,
14 Study on Security Vulnerabilities of Implicit Intents in Android
Jo, Min Jae;Shin, Ji Sun; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1175-1184,
15 A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response
Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1185-1195,
16 Design and implementation of the honeycomb structure visualization system for the effective security situational awareness of large-scale networks
Park, Jae-Beom;Kim, Huy-Kang;Kim, Eun-Jin; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1197-1213,
17 DDoS Attack Application Detection Method with Android Logging System
Choi, Seul-Ki;Hong, Min;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1215-1224,
18 A Study on Security Container to Prevent Data Leaks
Lee, Jong-Shik;Lee, Kyeong-Ho; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1225-1241,
19 A Study on Improving the Electronic Financial Fraud Prevention Service: Focusing on an Analysis of Electronic Financial Fraud Cases in 2013
Jeong, Dae Yong;Lee, Kyung-Bok;Park, Tae Hyoung; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1243-1261,
20 Cyber Defense Analysis and Improvement of Military ecosystem with Information Security Industry
Baek, Jaejong;Moon, Byoung-Moo; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1263-1269,
21 Studies on the effect of information security investment executive
Jeong, Seong-Hoon;Yoon, Joon-Sub;Lim, Jong-In;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1271-1284,
22 A Study on Management of the Secret Data in Defense Information System (Focusing on Defense Ammunition Information System)
Yeo, Seong-Cheol;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1285-1292,
23 A Study on Data Security Control Model of the Test System in Financial Institutions
Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1293-1308,
24 A Study on Selection Factors of Consulting Company for the Certification of Information Security Management System
Park, Kyeong-Tae;Kim, Sehun; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1309-1318,
25 Study on Security Grade Classification of Financial Company Documents
Kang, Bu Il;Kim, Seung Joo; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1319-1328,
26 A Study on the Methodology in Classifying the Importance of Information System
Choi, Myeonggil;Cho, Kang-Rae; / Korea Institute of Information Security and Cryptology , v.24, no.6, pp.1329-1335,