Browse > Article List

논문
1 A Simple Power Analysis Attack on ARIA Key Expansion Based on Hamming Weight Leakage
Park, Aesun;Han, Dong-Guk;Choi, Jun; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1319-1326,
2 An Analysis of Agility of the Cryptography API Next Generation in Microsoft: Based on Implementation Example of Applying Cryptography Algorithm HAS-160 in South Korea
Lee, Kyungroul;You, Ilsun;Yim, Kangbin; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1327-1339,
3 Androfilter: Android Malware Filter using Valid Market Data
Yang, Wonwoo;Kim, Jihye; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1341-1351,
4 State Information Based Recommendation Algorithm for Minimizing the Malicious User's Influence
Noh, Taewan;Oh, Hayoung;Noh, Giseop;Kim, Chong-Kwon; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1353-1360,
5 A Study on Mobile Game Security Threats by Analyzing Malicious Behavior of Auto Program of Clash of Clans
Heo, Geon Il;Heo, Cheong Il;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1361-1376,
6 The Automatic Collection and Analysis System of Cloud Artifact
Kim, Mingyu;Jeong, Doowon;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1377-1383,
7 A research on detection techniques of Proxy DLL malware disguised as a Windows library : Focus on the case of Winnti
Koo, JunSeok;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1385-1397,
8 Real time predictive analytic system design and implementation using Bigdata-log
Lee, Sang-jun;Lee, Dong-hoon; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1399-1410,
9 Techniques study of IMS/SIP based Lawful Interception in 3G networks
Lee, Myoung-rak;Pyo, Sang-Ho;In, Hoh Peter; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1411-1420,
10 Development of Windows forensic tool for verifying a set of data
Kim, Min-Seo;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1421-1433,
11 Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID
Shin, Jae-ho;Kim, In-seok; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1435-1447,
12 A lightweight detection mechanism of control flow modification for IoT devices
Pak, Dohyun;Lee, JongHyup; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1449-1453,
13 Advanced protocol against MITM attacks in Industrial Control System
Ko, Moo-seong;Oh, Sang-kyo;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1455-1463,
14 A research on improving client based detection feature by using server log analysis in FPS games
Kim, Seon Min;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1465-1475,
15 A Study on User Authentication with Smartphone Accelerometer Sensor
Seo, Jun-seok;Moon, Jong-sub; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1477-1484,
16 An effective detection method for hiding data in compound-document files
Kim, EunKwang;Jeon, SangJun;Han, JaeHyeok;Lee, MinWook;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1485-1494,
17 The analysis of data structure to digital forensic of dashboard camera
An, Hwihang;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1495-1502,
18 Advanced Mandatory Authentication Architecture Designed for Internet Bank
Hong, Ki-seok;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1503-1514,
19 WLAN Security Access Protocol for Rapid Initial Link Setup Process
Kim, Min-Hee;Park, Chang-Seop; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1515-1523,
20 A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique
Jeong, Seong Hoon;Kim, Hana;Shin, Youngsang;Lee, Taejin;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1525-1540,
21 Security Design for Information protection System using BSIMM
Park, Jung-Sup; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1541-1547,
22 Study on the Association between Personal Information Protection Legislation and Information Security Product
Kim, Min-Jeong;Lee, Jung Won;Yoo, Jinho; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1549-1560,
23 Research Trends in Information Security Economics: Focused on the Articles Presented at WEIS
Kang, Mi-Hwa;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1561-1570,
24 Study on Selection Methodology of Applicable Prospective Civil Information Security Technologies in Defense Cyberwarfare Sector
Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1571-1582,
25 An empirical study on the performance factors of the BSC perspectives on government support regional innovation clusters in the management consulting
Park, Soon-mo; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1583-1593,
26 Effective Risk Level Assessment Using Three-Dimensional Vector Visualization
Lee, Ju-young;Cho, In-hyun;Lee, Jae-hee;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1595-1606,
27 Decision Making Model for Selecting Financial Company Server Privilege Account Operations
Lee, Suk-Won;Lee, Kyung-Ho; / Korea Institute of Information Security and Cryptology , v.25, no.6, pp.1607-1620,