|
1 |
Virtual Credit Card Number Payment System with Stored Hash Value for Efficient Authentication
Park, Chan-Ho;Kim, Gun-Woo;Park, Chang-Seop;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.5-15,
|
|
2 |
A Code Concealment Method using Java Reflection and Dynamic Loading in Android
Kim, Jiyun;Go, Namhyeon;Park, Yongsu;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.17-30,
|
|
3 |
Method of Fuzzing Document Application Based on Android Devices
Jo, Je-Gyeong;Ryou, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.31-37,
|
|
4 |
The Research for Digital Evidence Acquisition Procedure within a Full Disk Encryption Environment
Jang, Sung-Min;Park, Jung-Heum;Pak, Chan-Ung;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.39-48,
|
|
5 |
The Design of Remote Digital Evidence Acquisition System for Incident Response of Smart Grid Devices
Kang, SeongKu;Kim, Sinkyu;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.49-60,
|
|
6 |
Study on security log visualization and security threat detection using RGB Palette
Lee, Dong-Gun;Kim, Huy Kang;Kim, Eunjin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.61-73,
|
|
7 |
A Study on Batch Auditing with Identification of Corrupted Cloud Storage in Multi-Cloud Environments
Shin, Sooyeon;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.75-82,
|
|
8 |
Secure and Efficient Client-side Deduplication for Cloud Storage
Park, Kyungsu;Eom, Ji Eun;Park, Jeongsu;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.83-94,
|
|
9 |
The security requirements suggestion based on cloud computing security threats for server virtualization system
Ma, Seung-Young;Ju, Jung-Ho;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.95-105,
|
|
10 |
Hacking Mail Profiling by Applying Case Based Reasoning
Park, Hyong-Su;Kim, Huy-Kang;Kim, Eun-Jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.107-122,
|
|
11 |
Privacy Preserving Source Based Deduplication In Cloud Storage
Park, Cheolhee;Hong, Dowon;Seo, Changho;Chang, Ku-Young;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.123-132,
|
|
12 |
Effective Normalization Method for Fraud Detection Using a Decision Tree
Park, Jae Hoon;Kim, Huy Kang;Kim, Eunjin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.133-146,
|
|
13 |
A study on the detection of DDoS attack using the IP Spoofing
Seo, Jung-Woo;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.147-153,
|
|
14 |
Information Dispersal Algorithm and Proof of Ownership for Data Deduplication in Dispersed Storage Systems
Shin, Youngjoo;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.155-164,
|
|
15 |
An integrated approach for identity and access management for efficient administrative work
Park, Byung-Eon;Yang, Jaesoo;Cho, Seong-Je;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.165-172,
|
|
16 |
A Study on the Countermeasures for Prevention of Opening a Fraud Account
Kim, Chang Woo;Yoon, Ji Won;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.173-179,
|
|
17 |
Study of effectiveness for the network separation policy of financial companies
Cho, Byeong-Joo;Yun, Jang-Ho;Lee, Kyeong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.181-195,
|
|
18 |
Study the role of information security personnel have on an organization's information security level
Choi, Dong-Keun;Song, Mi-Sun;Im, Jong In;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.197-209,
|
|
19 |
Study on Disaster Recovery Efficiency of Terminal PC in Financial Company
Yi, Seung-Chul;Yoon, Joon-Seob;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.211-224,
|
|
20 |
A Study on Decision Making Process of System Access Management
Cho, Young-Seok;Im, Jong-In;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.1, pp.225-235,
|
|