|
1 |
Optimization of Lightweight Encryption Algorithm (LEA) using Threads and Shared Memory of GPU
Park, Moo Kyu;Yoon, Ji Won;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.719-726,
|
|
2 |
Power Analysis Attacks on Blinding Countermeasure against Horizontal CPA
Lee, Sangyub;Kim, Taewon;Kim, HeeSeok;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.727-738,
|
|
3 |
Analysis on Vulnerability of Masked SEED Algorithm
Kim, TaeWon;Chang, Nam Su;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.739-747,
|
|
4 |
Implementation of SHA-3 Algorithm Based On ARM-11 Processors
Kang, Myeong-mo;Lee, Hee-woong;Hong, Dowon;Seo, Changho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.749-757,
|
|
5 |
A Study of Location-based Key Management Using a Grid for Wireless Sensor Networks
Choi, Jaewoo;Kim, Yonghyun;Kim, JuYoub;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.759-766,
|
|
6 |
Technique for Indentifying Cyber Crime Using Clue
Kim, Ju Hee;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.767-780,
|
|
7 |
Design and Implementation of Virtual and Invisible Private Disk (VIPDISK) having Secure Storage Device
Quan, Shan Guo;Kwon, Yong-Gu;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.781-792,
|
|
8 |
A Study on Supply Chain Risk Management of Automotive
Kim, Dong-won;Han, Keun-hee;Jeon, In-seok;Choi, Jin-yung;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.793-805,
|
|
9 |
Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework
Huseynov, Khalid;Yoo, Paul D.;Kim, Kwangjo;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.807-816,
|
|
10 |
Probabilistic K-nearest neighbor classifier for detection of malware in android mobile
Kang, Seungjun;Yoon, Ji Won;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.817-827,
|
|
11 |
Spyware detection system related to wiretapping based on android power consumption and network traffics
Park, Bum-joon;Lee, Ook;Cho, Sung-phil;Choi, Jung-woon;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.829-838,
|
|
12 |
A Efficient Contents Verification Scheme for Distributed Networking/Data Store
Kim, DaeYoub;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.839-847,
|
|
13 |
A study of RMT buyer detection for the collapse of GFG in MMORPG
Kang, Sung Wook;Lee, Jin;Lee, Jaehyuk;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.849-861,
|
|
14 |
An Efficient Kernel Introspection System using a Secure Timer on TrustZone
Kim, Jinmok;Kim, Donguk;Park, Jinbum;Kim, Jihoon;Kim, Hyoungshick;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.863-872,
|
|
15 |
Scheduler-based Defense Method against Address Translation Redirection Attack (ATRA)
Jang, Daehee;Jang, Jinsoo;Kim, Donguk;Choi, Changho;Kang, Brent ByungHoon;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.873-880,
|
|
16 |
A Study on Improving Security Controls in the Electronic Financial Transaction
Lee, Gangshin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.881-888,
|
|
17 |
Morale enhancing determination model of information security
Kim, Kyongwon;Lim, Jong In;Lee, Kyung-Ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.889-903,
|
|
18 |
A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions
Jo, Yeon-ho;Lee, Yong-pil;Lim, Jong-in;Lee, Kyoung-ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.905-914,
|
|
19 |
A study on effects of implementing information security governance by information security committee activities
Kim, Kunwoo;Kim, Jungduk;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.915-920,
|
|
20 |
Quantitative Scoring System on the Importance of Software Vulnerabilities
Ahn, Joonseon;Chang, Byeong-Mo;Lee, Eunyoung;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.921-932,
|
|
21 |
A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection
Choi, Ju Young;Kim, JinHyung;Park, Jung-Sub;Park, Choon Sik;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.933-940,
|
|
22 |
An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking
Lee, Sung-hoon;Kim, Seung-hyun;Jeong, Eui-yeob;Choi, Dae-seon;Jin, Seung-hun;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.941-950,
|
|
23 |
Telemedicine Security Risk Evaluation Using Attack Tree
Kim, Dong-won;Han, Keun-hee;Jeon, In-seok;Choi, Jin-yung;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.951-960,
|
|
24 |
Using the SIEM Software vulnerability detection model proposed
Jeon, In-seok;Han, Keun-hee;Kim, Dong-won;Choi, Jin-yung;
/
Korea Institute of Information Security and Cryptology
, v.25, no.4, pp.961-974,
|
|