Browse > Article List

논문
1 Optimized Binary Field Reduction Algorithm on 8-bit ATmega128 Processor
Park, Dong-Won;Kwon, Heetaek;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.241-251,
2 Side-Channel Attacks on LEA with reduced masked rounds
Park, Myungseo;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.253-260,
3 Study for improving attack Complexity against RSA Collision Analysis
Sim, Bo-Youn;Won, Yoo-Seung;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.261-270,
4 Safety Analysis of Various Padding Techniques on Padding Oracle Attack
Kim, Kimoon;Park, Myungseo;Kim, Jongsung;Lee, Changhoon;Moon, Dukjae;Hong, Seokhee; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.271-278,
5 A study on the managed security services(MSS) method for energy-based SCADA Systems
Jang, Jeong-Woo;Kim, Woo-Suk;Yoon, Ji-Won; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.279-292,
6 Designing SMS Phishing Profiling Model
Jeong, Youngho;Lee, Kukheon;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.293-302,
7 Study on the near-real time DNS query analyzing system for DNS amplification attacks
Lee, Ki-Taek;Baek, Seung-Soo;Kim, Seung-Joo; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.303-311,
8 A Unknown Phishing Site Detection Method in the Interior Network Environment
Park, Jeonguk;Cho, Gihwan; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.313-320,
9 Function partitioning methods for malware variant similarity comparison
Park, Chan-Kyu;Kim, Hyong-Shik;Lee, Tae Jin;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.321-330,
10 A Study on Regulations Status and Improving of Municipalities by Privacy Type
Yoo, Jung-Hoon;Han, Keunhee; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.331-342,
11 A Study on Information Access Control Policy Based on Risk Level of Security Incidents about IT Human Resources in Financial Institutions
Sim, Jae-Yoon;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.343-361,
12 Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle
Seo, Dal-Mi;Cha, Ki-Jong;Shin, Yo-Soon;Jeong, Choong-Heui;Kim, Young-Mi; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.363-374,
13 An Empirical Study on Expectation Factors and Certification Intention of ISMS
Park, Kyeong-Tae;Kim, Sehun; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.375-381,
14 A Proposal of Enhanced Personal Information Security management Framework of Consigning of Personal Information
Ko, Youngdai-Dai;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.383-393,
15 A method for quantitative measuring the degree of damage by personal information leakage
Kim, Pyong;Lee, Younho;Khudaybergenov, Timur; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.395-410,
16 A study on detection methodology of threat on cars from the viewpoint of IoT
Kwak, Byung Il;Han, Mi Ran;Kang, Ah Reum;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.411-421,
17 The Proposal of IoT products tracking and inventory management system using IPv6 based on static IP
Lee, Jeong-Min;Ahn, Jong-Chang;Lee, Ook; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.423-437,
18 Design and Implementation of The Capability Token based Access Control System in the Internet of Things
Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.439-448,
19 Side channel Attacks on LEA and Its Countermeasures
Park, Jin-Hak;Kim, Tae-Jong;An, Hyun-Jin;Won, Yoo-Seung;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.449-456,
20 Side Channel Attacks on HIGHT and Its Countermeasures
Kim, Tae-Jong;Won, Yoo-Seung;Park, Jin-Hak;An, Hyun-Jin;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.457-465,
21 Design of Improved Authentication Protocol for Sensor Networks in IoT Environment
Kim, Deuk-Hun;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.467-478,
22 Group Key Management Method for Secure Device in Smart Home Environment
Ryu, Ho-Seok;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.25, no.2, pp.479-487,