Browse > Article List

논문
1 Matchmaker: Fuzzy Vault Scheme for Weighted Preference
Purevsuren, Tuvshinkhuu;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.301-314,
2 A Preimage Attack on the MJH Hash Function
Lee, Jooyoung;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.315-318,
3 A Study on Service Security Framework for SW-IaaS Cloud
Choi, Myeonggil;Park, Choonsik;Jeong, Jaehun; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.319-325,
4 Key Recovery Algorithm for Randomly-Decayed AES Key Bits
Baek, Yoo-Jin; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.327-334,
5 Analysis and Countermeasure on RSA Algorithm Having High Attack Complexity in Collision-Based Power Analysis Attack
Kim, Suhri;Kim, Taewon;Jo, Sungmin;Kim, HeeSeok;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.335-344,
6 Digital Legal Seal for Message Authentication Code
Jung, ChangHun;Shin, DongOh;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee;Youm, Heung-Youl; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.345-358,
7 Building a Database of DQT Information to Identify a Source of the SmartPhone JPEG Image File
Kim, MinSik;Jung, Doowon;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.359-367,
8 The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor
Hyun, Miboon;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.369-375,
9 Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis
Hwang, Ho;Moon, Daesung;Kim, Ikkun; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.377-386,
10 Study on Recovery Techniques for the Deleted or Damaged Event Log(EVTX) Files
Shin, Yonghak;Cheon, Junyoung;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.387-396,
11 Illegal and Harmful Information Detection Technique Using Combination of Search Words
Han, Byeong Woo;Yoon, Ji Won; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.397-404,
12 A Proactive Inference Method of Suspicious Domains
Kang, Byeongho;YANG, JISU;So, Jaehyun;Kim, Czang Yeob; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.405-413,
13 Legislative Reform of Smart Grid Privacy Act
Lee, Donghyeok;Park, Namje; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.415-423,
14 A Proposal of Risk Management Framework for Design as a Secure Power Control System
Park, Jun Yong;Shin, Sumin;Song, Kyoung-Young; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.425-433,
15 A Study on the Possibility of Assuring 'The Right to be Forgotten' Through the Digital Extinction Technology
Joo, Moon-ho;Lim, Jong-in; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.435-447,
16 Factors Affecting Information Security Practice of Elementary School Students
Choi, Seung-Jae;Kim, Hyeong-Yeol;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.449-461,
17 Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident
Eom, Jae-Ha;Kim, Min-Jeong; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.463-474,
18 Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception
Kang, Ji Won;Lee, Ae Ri;Kim, Beomsoo; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.475-487,
19 An Analysis of Research Trends in Information Security Education
Kim, Kunwoo;Kim, Jungduk; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.489-499,
20 A Study on the Privacy Literacy Level Measurement for the Proper Exercise of the Right to Informational Self-Determination
Park, Hyang-mi;Yoo, Ji-Yeon; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.501-522,
21 Effects and Causality of Measures for Personal Information: Empirical Studies on Firm and Individual Behaviors and their Implications
Shin, Ilsoon; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.523-531,
22 Research on System Architecture and Simulation Environment for Cyber Warrior Training
Ahn, Myung Kil;Kim, Yong Hyun; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.533-540,
23 Improvement of the Certification Model for Enhancing Information Security Management Efficiency for the Financial Sector
Oh, Eun;Kim, Tae-Sung;Cho, Tae-Hee; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.541-550,
24 A Study on Quantitative Method of Certificate for Information Security Education Course in the Private Sector
Kim, Joo-hee;Cho, Sung-woo;Yoo, Dong-young; / Korea Institute of Information Security and Cryptology , v.26, no.2, pp.551-558,