Browse > Article List

논문
1 Simple Credit Card Payment Protocols Based on SSL and Passwords
Kim, Seon Beom;Kim, Min Gyu;Park, Jong Hwan; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.563-572,
2 IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment
Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.573-586,
3 A New Scalar Recoding Method against Side Channel Attacks
Ryu, Hyo Myoung;Cho, Sung Min;Kim, TaeWon;Kim, Chang han;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.587-601,
4 Design of Extendable QCA 4-to-2 Encoder Based on Majority Gate
Kim, Tae-Hwan;Jeon, Jun-Cheol; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.603-608,
5 A Brief Consideration on the Security of Hash-Based Authenticator
Byun, Jin Wook; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.609-612,
6 Error Control Protocol and Data Encryption Mechanism in the One-Way Network
Ha, Jaecheol;Kim, Kihyun; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.613-621,
7 A Study of Implementing Efficient Rotation for ARX Lightweight Block Cipher on Low-level Microcontrollers
Kim, Minwoo;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.623-630,
8 Efficient Optimization Method for Polynomial Selection
Kim, Suhri;Kwon, Heetaek;Lee, Yongseong;Chang, Nam Su;Yoon, Kisoon;Kim, Chang Han;Park, Young-Ho;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.631-643,
9 Methodology for Intercepting the Ransomware Attacks Using File I/O Intervals
Youn, Jung-moo;Jo, Je-geong;Ryu, Jae-cheol; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.645-653,
10 An Analysis of Detection of Malicious Packet Dropping and Detour Scheme in IoT based on IPv6
Choi, Jaewoo;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.655-659,
11 A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network
Chung, Jin Hee;Cho, Tae Ho; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.661-666,
12 A Study on Detecting of an Anonymity Network and an Effective Counterstrategy in the Massive Network Environment
Seo, Jung-woo;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.667-678,
13 A Practical Attack on In-Vehicle Network Using Repacked Android Applications
Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.679-691,
14 Coward Analysis based Spam SMS Detection Scheme
Oh, Hayoung; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.693-700,
15 Study on Privacy in the IPTV Broadcasting Service
Lee, Jinhyuk;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.701-712,
16 A Study on the Privacy Policy Comparison by Domestic and Foreign Portal Sites and Domestic Web sites Classified by Industry
Jeon, Changuk;Yoo, Jinho; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.713-724,
17 A Study on Introducing Security Certification for Control Systems
Choi, Hoyeol;Kim, Daeyeong;Shin, Hyungjune;Hahn, Changhee;Hur, Junbeom; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.725-734,
18 A Preliminary Research on the Impact of Perception of Personal Information Leakage Incidents on the Behavior of Individual Information Management in the Mobile Banking Contexts
Kim, Jungduk;Lim, Se-Hun; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.735-744,
19 Redundancy assessment of PIMS and PIPL by parsing
Kim, So-Ra;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.745-756,
20 An Analysis of Password Meters for Domestic Web Sites
Kim, KyoungHoon;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.757-767,
21 A Study on the Short Term Curriculum for Strengthening Information Security Capability in Public Sector
Yun, Joobeom; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.769-776,
22 A Case Study on Program Outcomes Assessment of Information Security Program for Engineering Education Accreditation
Chung, Weonil;Oh, Soo-Hyun;Kim, Hwankoo; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.777-785,
23 Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism
Lee, Donghyeok;Park, Namje; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.787-797,
24 A Study on the Distribution Estimation of Personal Data Leak Incidents
Hwang, Yoon-hee;Yoo, Jinho; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.799-808,
25 A Case Study of the Impact of a Cybersecurity Breach on a Smart Grid Based on an AMI Attack Scenario
Jun, Hyo-Jung;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.809-820,
26 Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System)
Kong, Hee-Kyung;Jun, Hyo-Jung;Lee, Song-Ha;Kang, Min-Seong;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.821-835,
27 Effects of Lifelog Experience on Technology Satisfaction and Perception of Right to be Forgotten
Yoon, Il-han;Kwon, Sun-dong; / Korea Institute of Information Security and Cryptology , v.26, no.3, pp.837-852,