|
1 |
Optimized Binary Field Reduction Algorithm on 8-bit ATmega128 Processor
Park, Dong-Won;Kwon, Heetaek;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.241-251,
|
|
2 |
Side-Channel Attacks on LEA with reduced masked rounds
Park, Myungseo;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.253-260,
|
|
3 |
Study for improving attack Complexity against RSA Collision Analysis
Sim, Bo-Youn;Won, Yoo-Seung;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.261-270,
|
|
4 |
Safety Analysis of Various Padding Techniques on Padding Oracle Attack
Kim, Kimoon;Park, Myungseo;Kim, Jongsung;Lee, Changhoon;Moon, Dukjae;Hong, Seokhee;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.271-278,
|
|
5 |
A study on the managed security services(MSS) method for energy-based SCADA Systems
Jang, Jeong-Woo;Kim, Woo-Suk;Yoon, Ji-Won;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.279-292,
|
|
6 |
Designing SMS Phishing Profiling Model
Jeong, Youngho;Lee, Kukheon;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.293-302,
|
|
7 |
Study on the near-real time DNS query analyzing system for DNS amplification attacks
Lee, Ki-Taek;Baek, Seung-Soo;Kim, Seung-Joo;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.303-311,
|
|
8 |
A Unknown Phishing Site Detection Method in the Interior Network Environment
Park, Jeonguk;Cho, Gihwan;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.313-320,
|
|
9 |
Function partitioning methods for malware variant similarity comparison
Park, Chan-Kyu;Kim, Hyong-Shik;Lee, Tae Jin;Ryou, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.321-330,
|
|
10 |
A Study on Regulations Status and Improving of Municipalities by Privacy Type
Yoo, Jung-Hoon;Han, Keunhee;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.331-342,
|
|
11 |
A Study on Information Access Control Policy Based on Risk Level of Security Incidents about IT Human Resources in Financial Institutions
Sim, Jae-Yoon;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.343-361,
|
|
12 |
Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle
Seo, Dal-Mi;Cha, Ki-Jong;Shin, Yo-Soon;Jeong, Choong-Heui;Kim, Young-Mi;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.363-374,
|
|
13 |
An Empirical Study on Expectation Factors and Certification Intention of ISMS
Park, Kyeong-Tae;Kim, Sehun;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.375-381,
|
|
14 |
A Proposal of Enhanced Personal Information Security management Framework of Consigning of Personal Information
Ko, Youngdai-Dai;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.383-393,
|
|
15 |
A method for quantitative measuring the degree of damage by personal information leakage
Kim, Pyong;Lee, Younho;Khudaybergenov, Timur;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.395-410,
|
|
16 |
A study on detection methodology of threat on cars from the viewpoint of IoT
Kwak, Byung Il;Han, Mi Ran;Kang, Ah Reum;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.411-421,
|
|
17 |
The Proposal of IoT products tracking and inventory management system using IPv6 based on static IP
Lee, Jeong-Min;Ahn, Jong-Chang;Lee, Ook;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.423-437,
|
|
18 |
Design and Implementation of The Capability Token based Access Control System in the Internet of Things
Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.439-448,
|
|
19 |
Side channel Attacks on LEA and Its Countermeasures
Park, Jin-Hak;Kim, Tae-Jong;An, Hyun-Jin;Won, Yoo-Seung;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.449-456,
|
|
20 |
Side Channel Attacks on HIGHT and Its Countermeasures
Kim, Tae-Jong;Won, Yoo-Seung;Park, Jin-Hak;An, Hyun-Jin;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.457-465,
|
|
21 |
Design of Improved Authentication Protocol for Sensor Networks in IoT Environment
Kim, Deuk-Hun;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.467-478,
|
|
22 |
Group Key Management Method for Secure Device in Smart Home Environment
Ryu, Ho-Seok;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.2, pp.479-487,
|
|