|
1 |
Matchmaker: Fuzzy Vault Scheme for Weighted Preference
Purevsuren, Tuvshinkhuu;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.301-314,
|
|
2 |
A Preimage Attack on the MJH Hash Function
Lee, Jooyoung;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.315-318,
|
|
3 |
A Study on Service Security Framework for SW-IaaS Cloud
Choi, Myeonggil;Park, Choonsik;Jeong, Jaehun;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.319-325,
|
|
4 |
Key Recovery Algorithm for Randomly-Decayed AES Key Bits
Baek, Yoo-Jin;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.327-334,
|
|
5 |
Analysis and Countermeasure on RSA Algorithm Having High Attack Complexity in Collision-Based Power Analysis Attack
Kim, Suhri;Kim, Taewon;Jo, Sungmin;Kim, HeeSeok;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.335-344,
|
|
6 |
Digital Legal Seal for Message Authentication Code
Jung, ChangHun;Shin, DongOh;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee;Youm, Heung-Youl;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.345-358,
|
|
7 |
Building a Database of DQT Information to Identify a Source of the SmartPhone JPEG Image File
Kim, MinSik;Jung, Doowon;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.359-367,
|
|
8 |
The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor
Hyun, Miboon;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.369-375,
|
|
9 |
Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis
Hwang, Ho;Moon, Daesung;Kim, Ikkun;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.377-386,
|
|
10 |
Study on Recovery Techniques for the Deleted or Damaged Event Log(EVTX) Files
Shin, Yonghak;Cheon, Junyoung;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.387-396,
|
|
11 |
Illegal and Harmful Information Detection Technique Using Combination of Search Words
Han, Byeong Woo;Yoon, Ji Won;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.397-404,
|
|
12 |
A Proactive Inference Method of Suspicious Domains
Kang, Byeongho;YANG, JISU;So, Jaehyun;Kim, Czang Yeob;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.405-413,
|
|
13 |
Legislative Reform of Smart Grid Privacy Act
Lee, Donghyeok;Park, Namje;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.415-423,
|
|
14 |
A Proposal of Risk Management Framework for Design as a Secure Power Control System
Park, Jun Yong;Shin, Sumin;Song, Kyoung-Young;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.425-433,
|
|
15 |
A Study on the Possibility of Assuring 'The Right to be Forgotten' Through the Digital Extinction Technology
Joo, Moon-ho;Lim, Jong-in;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.435-447,
|
|
16 |
Factors Affecting Information Security Practice of Elementary School Students
Choi, Seung-Jae;Kim, Hyeong-Yeol;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.449-461,
|
|
17 |
Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident
Eom, Jae-Ha;Kim, Min-Jeong;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.463-474,
|
|
18 |
Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception
Kang, Ji Won;Lee, Ae Ri;Kim, Beomsoo;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.475-487,
|
|
19 |
An Analysis of Research Trends in Information Security Education
Kim, Kunwoo;Kim, Jungduk;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.489-499,
|
|
20 |
A Study on the Privacy Literacy Level Measurement for the Proper Exercise of the Right to Informational Self-Determination
Park, Hyang-mi;Yoo, Ji-Yeon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.501-522,
|
|
21 |
Effects and Causality of Measures for Personal Information: Empirical Studies on Firm and Individual Behaviors and their Implications
Shin, Ilsoon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.523-531,
|
|
22 |
Research on System Architecture and Simulation Environment for Cyber Warrior Training
Ahn, Myung Kil;Kim, Yong Hyun;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.533-540,
|
|
23 |
Improvement of the Certification Model for Enhancing Information Security Management Efficiency for the Financial Sector
Oh, Eun;Kim, Tae-Sung;Cho, Tae-Hee;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.541-550,
|
|
24 |
A Study on Quantitative Method of Certificate for Information Security Education Course in the Private Sector
Kim, Joo-hee;Cho, Sung-woo;Yoo, Dong-young;
/
Korea Institute of Information Security and Cryptology
, v.26, no.2, pp.551-558,
|
|