Browse > Article List

논문
1 Optimization of Lightweight Encryption Algorithm (LEA) using Threads and Shared Memory of GPU
Park, Moo Kyu;Yoon, Ji Won; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.719-726,
2 Power Analysis Attacks on Blinding Countermeasure against Horizontal CPA
Lee, Sangyub;Kim, Taewon;Kim, HeeSeok;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.727-738,
3 Analysis on Vulnerability of Masked SEED Algorithm
Kim, TaeWon;Chang, Nam Su; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.739-747,
4 Implementation of SHA-3 Algorithm Based On ARM-11 Processors
Kang, Myeong-mo;Lee, Hee-woong;Hong, Dowon;Seo, Changho; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.749-757,
5 A Study of Location-based Key Management Using a Grid for Wireless Sensor Networks
Choi, Jaewoo;Kim, Yonghyun;Kim, JuYoub;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.759-766,
6 Technique for Indentifying Cyber Crime Using Clue
Kim, Ju Hee; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.767-780,
7 Design and Implementation of Virtual and Invisible Private Disk (VIPDISK) having Secure Storage Device
Quan, Shan Guo;Kwon, Yong-Gu; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.781-792,
8 A Study on Supply Chain Risk Management of Automotive
Kim, Dong-won;Han, Keun-hee;Jeon, In-seok;Choi, Jin-yung; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.793-805,
9 Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework
Huseynov, Khalid;Yoo, Paul D.;Kim, Kwangjo; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.807-816,
10 Probabilistic K-nearest neighbor classifier for detection of malware in android mobile
Kang, Seungjun;Yoon, Ji Won; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.817-827,
11 Spyware detection system related to wiretapping based on android power consumption and network traffics
Park, Bum-joon;Lee, Ook;Cho, Sung-phil;Choi, Jung-woon; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.829-838,
12 A Efficient Contents Verification Scheme for Distributed Networking/Data Store
Kim, DaeYoub; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.839-847,
13 A study of RMT buyer detection for the collapse of GFG in MMORPG
Kang, Sung Wook;Lee, Jin;Lee, Jaehyuk;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.849-861,
14 An Efficient Kernel Introspection System using a Secure Timer on TrustZone
Kim, Jinmok;Kim, Donguk;Park, Jinbum;Kim, Jihoon;Kim, Hyoungshick; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.863-872,
15 Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA)
Jang, Daehee;Jang, Jinsoo;Kim, Donguk;Choi, Changho;Kang, Brent ByungHoon; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.873-880,
16 A Study on Improving Security Controls in the Electronic Financial Transaction
Lee, Gangshin; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.881-888,
17 Morale enhancing determination model of information security
Kim, Kyongwon;Lim, Jong In;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.889-903,
18 A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions
Jo, Yeon-ho;Lee, Yong-pil;Lim, Jong-in;Lee, Kyoung-ho; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.905-914,
19 A study on effects of implementing information security governance by information security committee activities
Kim, Kunwoo;Kim, Jungduk; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.915-920,
20 Quantitative Scoring System on the Importance of Software Vulnerabilities
Ahn, Joonseon;Chang, Byeong-Mo;Lee, Eunyoung; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.921-932,
21 A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection
Choi, Ju Young;Kim, JinHyung;Park, Jung-Sub;Park, Choon Sik; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.933-940,
22 An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking
Lee, Sung-hoon;Kim, Seung-hyun;Jeong, Eui-yeob;Choi, Dae-seon;Jin, Seung-hun; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.941-950,
23 Telemedicine Security Risk Evaluation Using Attack Tree
Kim, Dong-won;Han, Keun-hee;Jeon, In-seok;Choi, Jin-yung; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.951-960,
24 Using the SIEM Software vulnerability detection model proposed
Jeon, In-seok;Han, Keun-hee;Kim, Dong-won;Choi, Jin-yung; / Korea Institute of Information Security and Cryptology , v.25, no.4, pp.961-974,