Browse > Article List

논문
1 Virtual Credit Card Number Payment System with Stored Hash Value for Efficient Authentication
Park, Chan-Ho;Kim, Gun-Woo;Park, Chang-Seop; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.5-15,
2 A Code Concealment Method using Java Reflection and Dynamic Loading in Android
Kim, Jiyun;Go, Namhyeon;Park, Yongsu; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.17-30,
3 Method of Fuzzing Document Application Based on Android Devices
Jo, Je-Gyeong;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.31-37,
4 The Research for Digital Evidence Acquisition Procedure within a Full Disk Encryption Environment
Jang, Sung-Min;Park, Jung-Heum;Pak, Chan-Ung;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.39-48,
5 The Design of Remote Digital Evidence Acquisition System for Incident Response of Smart Grid Devices
Kang, SeongKu;Kim, Sinkyu; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.49-60,
6 Study on security log visualization and security threat detection using RGB Palette
Lee, Dong-Gun;Kim, Huy Kang;Kim, Eunjin; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.61-73,
7 A Study on Batch Auditing with Identification of Corrupted Cloud Storage in Multi-Cloud Environments
Shin, Sooyeon;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.75-82,
8 Secure and Efficient Client-side Deduplication for Cloud Storage
Park, Kyungsu;Eom, Ji Eun;Park, Jeongsu;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.83-94,
9 The security requirements suggestion based on cloud computing security threats for server virtualization system
Ma, Seung-Young;Ju, Jung-Ho;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.95-105,
10 Hacking Mail Profiling by Applying Case Based Reasoning
Park, Hyong-Su;Kim, Huy-Kang;Kim, Eun-Jin; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.107-122,
11 Privacy Preserving Source Based Deduplication In Cloud Storage
Park, Cheolhee;Hong, Dowon;Seo, Changho;Chang, Ku-Young; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.123-132,
12 Effective Normalization Method for Fraud Detection Using a Decision Tree
Park, Jae Hoon;Kim, Huy Kang;Kim, Eunjin; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.133-146,
13 A study on the detection of DDoS attack using the IP Spoofing
Seo, Jung-Woo;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.147-153,
14 Information Dispersal Algorithm and Proof of Ownership for Data Deduplication in Dispersed Storage Systems
Shin, Youngjoo; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.155-164,
15 An integrated approach for identity and access management for efficient administrative work
Park, Byung-Eon;Yang, Jaesoo;Cho, Seong-Je; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.165-172,
16 A Study on the Countermeasures for Prevention of Opening a Fraud Account
Kim, Chang Woo;Yoon, Ji Won; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.173-179,
17 Study of effectiveness for the network separation policy of financial companies
Cho, Byeong-Joo;Yun, Jang-Ho;Lee, Kyeong-Ho; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.181-195,
18 Study the role of information security personnel have on an organization's information security level
Choi, Dong-Keun;Song, Mi-Sun;Im, Jong In;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.197-209,
19 Study on Disaster Recovery Efficiency of Terminal PC in Financial Company
Yi, Seung-Chul;Yoon, Joon-Seob;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.211-224,
20 A Study on Decision Making Process of System Access Management
Cho, Young-Seok;Im, Jong-In;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.25, no.1, pp.225-235,