Browse > Article List

논문
1 Type II Optimal Normal Basis Multipliers in GF(2n)
Kim, Chang Han;Chang, Nam Su; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.979-984,
2 Security Evaluation Against Collision-based Power Analysis on RSA Algorithm Adopted Exponent Splitting Method
Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.985-991,
3 HB+ protocol-based Smart OTP Authentication
Shin, Ji Sun; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.993-999,
4 Threatening privacy by identifying appliances and the pattern of the usage from electric signal data
Cho, Jae yeon;Yoon, Ji Won; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1001-1009,
5 Breaking character and natural image based CAPTCHA using feature classification
Kim, Jaehwan;Kim, Suah;Kim, Hyoung Joong; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1011-1019,
6 Efficient method for finding patched vulnerability with code filtering in Apple iOS
Jo, Je-gyeong;Ryou, Jae-cheol; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1021-1026,
7 Real-time Abnormal Behavior Detection System based on Fast Data
Lee, Myungcheol;Moon, Daesung;Kim, Ikkyun; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1027-1041,
8 Study of Snort Intrusion Detection Rules for Recognition of Intelligent Threats and Response of Active Detection
Han, Dong-hee;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1043-1057,
9 A Study on Hard Disk Drive ATA Passwords
Lee, Ju-young;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1059-1065,
10 A Study on android emulator detection for mobile game security
Yoon, Jongseong;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1067-1075,
11 A study on hard-core users and bots detection using classification of game character's growth type in online games
Lee, Jin;Kang, Sung Wook;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1077-1084,
12 Study of Biometrics using Tritone Paradox
Jung, Changhoon;Shin, DongOh;Nyang, DaeHun;Lee, KyungHee; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1085-1095,
13 A survey and categorization of anomaly detection in online games
Kwak, Byung Il;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1097-1114,
14 Research on online game bot guild detection method
Kim, Harang;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1115-1122,
15 A study on macro detection using information of touch events in Android mobile game environment
Kim, Jeong-hyeon;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1123-1129,
16 Game-bot detection based on Clustering of asset-varied location coordinates
Song, Hyun Min;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1131-1141,
17 A recovery method for deleted records in the ESE Database
Kim, Jeong-hyeon;Choi, Jong-hyun;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1143-1151,
18 A Study on Development of Digital Forensic Capability Evaluation Indices
Park, Hee-il;Yoon, Jong-seong;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1153-1166,
19 The Study on Forensic Methodology of Firefox OS
Kim, Do-Su;Choi, Jong-hyun;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1167-1174,
20 Public Key based Virtual Credit Card Number Payment System for Efficient Authentication in Card Present Transaction
Park, Chan-ho;Park, Chang-seop; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1175-1186,
21 Privacy-Preserving Outlier Detection in Healthcare Services
Lee, Bo Young;Choi, Wonsuk;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1187-1199,
22 A Study on Deobfuscation Method of Android and Implementation of Automatic Analysis Tool
Lee, Se Young;Park, Jin Hyung;Park, Moon Chan;Suk, Jae Hyuk;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1201-1215,
23 A Study On Advanced Model of Web Vulnerability Scoring Technique
Byeon, Autumn;Lim, Jong In;Lee, Kyong-Ho; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1217-1224,
24 A Study on Awareness of Information Security Influencing Trustness
Jeong, Jaehun;Choi, Myeonggil; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1225-1233,
25 A Study of Interpretation Effect of Passwords to Password Generation
Kim, Seung-Yeon;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1235-1243,
26 Protection of Personal Information on Cloud Service Models
Lee, Bosung;Kim, Beomsoo; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1245-1255,
27 A Study on Protection Profile for Multi-function Devices
Lee, Dongubm; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1257-1268,
28 Information and Communication Security legal system's problems and improvement plan
Kwon, Hun-Yeong; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1269-1279,
29 Which country's end devices are most sharing vulnerabilities in East Asia?
Kim, Kwangwon;Won, Yoon Ji; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1281-1291,
30 A study on the Development for the National Cybersecurity Capability Assessment Criteria
Bae, Sunha;Park, Sangdon;Kim, So Jeong; / Korea Institute of Information Security and Cryptology , v.25, no.5, pp.1293-1314,