|
1 |
The De-identification Technique Using Data Grouping in Relational Database
Park, Jun-Bum;Jin, Seung-Hun;Choi, Daeseon;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.493-500,
|
|
2 |
A Multi-Channel Security Card based on Cryptographically Secure Pseudo-Random Number Generator
Seo, Hwa-jeong;Seok, Seon-hee;Kim, Kyoung-hoon;Kim, Ho-won;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.501-507,
|
|
3 |
An Improved Side Channel Power Analysis with OP-Amp
Kim, JinBae;Ji, JaeDeok;Cho, Jong-Won;Kim, MinKu;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.509-517,
|
|
4 |
Secure Transaction Method on Smartphones with Smartwatches
Zhou, Jun;Choi, JinChun;Nyang, DaeHun;Lee, KyungHee;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.519-530,
|
|
5 |
Certificateless Non-Interactive Key Exchange Protocol with Forward Secrecy
Lee, Young Kyung;Eom, Ji Eun;Seo, Seung-Hyun;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.531-546,
|
|
6 |
Provable Security of PRF-based Key Derivation Functions according to Input Types of Counters
Kim, Nayoung;Kang, Ju-Sung;Yeom, Yongjin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.547-557,
|
|
7 |
Countermeasures for BadUSB Vulnerability
Choi, Jun;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.559-565,
|
|
8 |
A generating method of CM parameters of pairing-friendly abelian surfaces using Brezing-Weng family
Yoon, Kisoon;Park, Young-Ho;Chang, Nam Su;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.567-571,
|
|
9 |
Method of estimating the deleted time of applications using Amcache.hve
Kim, Moon-Ho;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.573-583,
|
|
10 |
The Method for Data Acquisition on a Live NAS System
Seo, Hyeong-Min;Kim, Dohyun;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.585-594,
|
|
11 |
A Study on Preprocessing Method for Effective Semantic-based Similarity Measures using Approximate Matching Algorithm
Kang, Hari;Jeong, Doowon;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.595-602,
|
|
12 |
A Study on the attack technique using android UI events
Yoon, Seok-Eon;Kim, Min-Sung;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.603-613,
|
|
13 |
A Study on Improvement of Effectiveness Using Anomaly Analysis rule modification in Electronic Finance Trading
Choi, Eui-soon;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.615-625,
|
|
14 |
A study on the identity theft detection model in MMORPGs
Kim, Hana;Kwak, Byung Il;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.627-637,
|
|
15 |
Risk Rating Process of Cyber Security Threats in NPP I&C
Lee, Woomyo;Chung, Manhyun;Min, Byung-Gil;Seo, Jungtaek;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.639-648,
|
|
16 |
The relationship between security incidents and value of companies : Case of listed companies in Korea
Hwang, Haesu;Lee, Heesang;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.649-664,
|
|
17 |
Analysis on international financial biometric adoption cases and propose a scheme for korean financial telebiometrics
Shin, Yong-Nyuo;Chun, Myung Geun;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.665-672,
|
|
18 |
A Comparative Study on Reforming the Resident Registration Number
Kim, Seon-Ju;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.673-689,
|
|
19 |
A Study on Personal Information Protection Management Assessment Method by DEA
Jeong, Myeong-soo;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.691-701,
|
|
20 |
A Study of Security Certification and Accreditation for DNP3 linkage section in EMS/SCADA
Kim, Jongwan;Shon, Taeshik;
/
Korea Institute of Information Security and Cryptology
, v.25, no.3, pp.703-713,
|
|