Browse > Article List

논문
1 The De-identification Technique Using Data Grouping in Relational Database
Park, Jun-Bum;Jin, Seung-Hun;Choi, Daeseon; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.493-500,
2 A Multi-Channel Security Card based on Cryptographically Secure Pseudo-Random Number Generator
Seo, Hwa-jeong;Seok, Seon-hee;Kim, Kyoung-hoon;Kim, Ho-won; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.501-507,
3 An Improved Side Channel Power Analysis with OP-Amp
Kim, JinBae;Ji, JaeDeok;Cho, Jong-Won;Kim, MinKu;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.509-517,
4 Secure Transaction Method on Smartphones with Smartwatches
Zhou, Jun;Choi, JinChun;Nyang, DaeHun;Lee, KyungHee; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.519-530,
5 Certificateless Non-Interactive Key Exchange Protocol with Forward Secrecy
Lee, Young Kyung;Eom, Ji Eun;Seo, Seung-Hyun;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.531-546,
6 Provable Security of PRF-based Key Derivation Functions according to Input Types of Counters
Kim, Nayoung;Kang, Ju-Sung;Yeom, Yongjin; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.547-557,
7 Countermeasures for BadUSB Vulnerability
Choi, Jun; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.559-565,
8 A generating method of CM parameters of pairing-friendly abelian surfaces using Brezing-Weng family
Yoon, Kisoon;Park, Young-Ho;Chang, Nam Su; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.567-571,
9 Method of estimating the deleted time of applications using Amcache.hve
Kim, Moon-Ho;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.573-583,
10 The Method for Data Acquisition on a Live NAS System
Seo, Hyeong-Min;Kim, Dohyun;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.585-594,
11 A Study on Preprocessing Method for Effective Semantic-based Similarity Measures using Approximate Matching Algorithm
Kang, Hari;Jeong, Doowon;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.595-602,
12 A Study on the attack technique using android UI events
Yoon, Seok-Eon;Kim, Min-Sung;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.603-613,
13 A Study on Improvement of Effectiveness Using Anomaly Analysis rule modification in Electronic Finance Trading
Choi, Eui-soon;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.615-625,
14 A study on the identity theft detection model in MMORPGs
Kim, Hana;Kwak, Byung Il;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.627-637,
15 Risk Rating Process of Cyber Security Threats in NPP I&C
Lee, Woomyo;Chung, Manhyun;Min, Byung-Gil;Seo, Jungtaek; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.639-648,
16 The relationship between security incidents and value of companies : Case of listed companies in Korea
Hwang, Haesu;Lee, Heesang; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.649-664,
17 Analysis on international financial biometric adoption cases and propose a scheme for korean financial telebiometrics
Shin, Yong-Nyuo;Chun, Myung Geun; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.665-672,
18 A Comparative Study on Reforming the Resident Registration Number
Kim, Seon-Ju;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.673-689,
19 A Study on Personal Information Protection Management Assessment Method by DEA
Jeong, Myeong-soo;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.691-701,
20 A Study of Security Certification and Accreditation for DNP3 linkage section in EMS/SCADA
Kim, Jongwan;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.25, no.3, pp.703-713,