|
1 |
Type II Optimal Normal Basis Multipliers in GF(2n)
Kim, Chang Han;Chang, Nam Su;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.979-984,
|
|
2 |
Security Evaluation Against Collision-based Power Analysis on RSA Algorithm Adopted Exponent Splitting Method
Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.985-991,
|
|
3 |
HB+ protocol-based Smart OTP Authentication
Shin, Ji Sun;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.993-999,
|
|
4 |
Threatening privacy by identifying appliances and the pattern of the usage from electric signal data
Cho, Jae yeon;Yoon, Ji Won;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1001-1009,
|
|
5 |
Breaking character and natural image based CAPTCHA using feature classification
Kim, Jaehwan;Kim, Suah;Kim, Hyoung Joong;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1011-1019,
|
|
6 |
Efficient method for finding patched vulnerability with code filtering in Apple iOS
Jo, Je-gyeong;Ryou, Jae-cheol;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1021-1026,
|
|
7 |
Real-time Abnormal Behavior Detection System based on Fast Data
Lee, Myungcheol;Moon, Daesung;Kim, Ikkyun;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1027-1041,
|
|
8 |
Study of Snort Intrusion Detection Rules for Recognition of Intelligent Threats and Response of Active Detection
Han, Dong-hee;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1043-1057,
|
|
9 |
A Study on Hard Disk Drive ATA Passwords
Lee, Ju-young;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1059-1065,
|
|
10 |
A Study on android emulator detection for mobile game security
Yoon, Jongseong;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1067-1075,
|
|
11 |
A study on hard-core users and bots detection using classification of game character's growth type in online games
Lee, Jin;Kang, Sung Wook;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1077-1084,
|
|
12 |
Study of Biometrics using Tritone Paradox
Jung, Changhoon;Shin, DongOh;Nyang, DaeHun;Lee, KyungHee;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1085-1095,
|
|
13 |
A survey and categorization of anomaly detection in online games
Kwak, Byung Il;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1097-1114,
|
|
14 |
Research on online game bot guild detection method
Kim, Harang;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1115-1122,
|
|
15 |
A study on macro detection using information of touch events in Android mobile game environment
Kim, Jeong-hyeon;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1123-1129,
|
|
16 |
Game-bot detection based on Clustering of asset-varied location coordinates
Song, Hyun Min;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1131-1141,
|
|
17 |
A recovery method for deleted records in the ESE Database
Kim, Jeong-hyeon;Choi, Jong-hyun;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1143-1151,
|
|
18 |
A Study on Development of Digital Forensic Capability Evaluation Indices
Park, Hee-il;Yoon, Jong-seong;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1153-1166,
|
|
19 |
The Study on Forensic Methodology of Firefox OS
Kim, Do-Su;Choi, Jong-hyun;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1167-1174,
|
|
20 |
Public Key based Virtual Credit Card Number Payment System for Efficient Authentication in Card Present Transaction
Park, Chan-ho;Park, Chang-seop;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1175-1186,
|
|
21 |
Privacy-Preserving Outlier Detection in Healthcare Services
Lee, Bo Young;Choi, Wonsuk;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1187-1199,
|
|
22 |
A Study on Deobfuscation Method of Android and Implementation of Automatic Analysis Tool
Lee, Se Young;Park, Jin Hyung;Park, Moon Chan;Suk, Jae Hyuk;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1201-1215,
|
|
23 |
A Study On Advanced Model of Web Vulnerability Scoring Technique
Byeon, Autumn;Lim, Jong In;Lee, Kyong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1217-1224,
|
|
24 |
A Study on Awareness of Information Security Influencing Trustness
Jeong, Jaehun;Choi, Myeonggil;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1225-1233,
|
|
25 |
A Study of Interpretation Effect of Passwords to Password Generation
Kim, Seung-Yeon;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1235-1243,
|
|
26 |
Protection of Personal Information on Cloud Service Models
Lee, Bosung;Kim, Beomsoo;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1245-1255,
|
|
27 |
A Study on Protection Profile for Multi-function Devices
Lee, Dongubm;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1257-1268,
|
|
28 |
Information and Communication Security legal system's problems and improvement plan
Kwon, Hun-Yeong;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1269-1279,
|
|
29 |
Which country's end devices are most sharing vulnerabilities in East Asia?
Kim, Kwangwon;Won, Yoon Ji;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1281-1291,
|
|
30 |
A study on the Development for the National Cybersecurity Capability Assessment Criteria
Bae, Sunha;Park, Sangdon;Kim, So Jeong;
/
Korea Institute of Information Security and Cryptology
, v.25, no.5, pp.1293-1314,
|
|