|
1 |
Simple Credit Card Payment Protocols Based on SSL and Passwords
Kim, Seon Beom;Kim, Min Gyu;Park, Jong Hwan;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.563-572,
|
|
2 |
IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment
Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.573-586,
|
|
3 |
A New Scalar Recoding Method against Side Channel Attacks
Ryu, Hyo Myoung;Cho, Sung Min;Kim, TaeWon;Kim, Chang han;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.587-601,
|
|
4 |
Design of Extendable QCA 4-to-2 Encoder Based on Majority Gate
Kim, Tae-Hwan;Jeon, Jun-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.603-608,
|
|
5 |
A Brief Consideration on the Security of Hash-Based Authenticator
Byun, Jin Wook;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.609-612,
|
|
6 |
Error Control Protocol and Data Encryption Mechanism in the One-Way Network
Ha, Jaecheol;Kim, Kihyun;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.613-621,
|
|
7 |
A Study of Implementing Efficient Rotation for ARX Lightweight Block Cipher on Low-level Microcontrollers
Kim, Minwoo;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.623-630,
|
|
8 |
Efficient Optimization Method for Polynomial Selection
Kim, Suhri;Kwon, Heetaek;Lee, Yongseong;Chang, Nam Su;Yoon, Kisoon;Kim, Chang Han;Park, Young-Ho;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.631-643,
|
|
9 |
Methodology for Intercepting the Ransomware Attacks Using File I/O Intervals
Youn, Jung-moo;Jo, Je-geong;Ryu, Jae-cheol;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.645-653,
|
|
10 |
An Analysis of Detection of Malicious Packet Dropping and Detour Scheme in IoT based on IPv6
Choi, Jaewoo;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.655-659,
|
|
11 |
A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network
Chung, Jin Hee;Cho, Tae Ho;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.661-666,
|
|
12 |
A Study on Detecting of an Anonymity Network and an Effective Counterstrategy in the Massive Network Environment
Seo, Jung-woo;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.667-678,
|
|
13 |
A Practical Attack on In-Vehicle Network Using Repacked Android Applications
Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.679-691,
|
|
14 |
Coward Analysis based Spam SMS Detection Scheme
Oh, Hayoung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.693-700,
|
|
15 |
Study on Privacy in the IPTV Broadcasting Service
Lee, Jinhyuk;Kim, Seungjoo;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.701-712,
|
|
16 |
A Study on the Privacy Policy Comparison by Domestic and Foreign Portal Sites and Domestic Web sites Classified by Industry
Jeon, Changuk;Yoo, Jinho;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.713-724,
|
|
17 |
A Study on Introducing Security Certification for Control Systems
Choi, Hoyeol;Kim, Daeyeong;Shin, Hyungjune;Hahn, Changhee;Hur, Junbeom;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.725-734,
|
|
18 |
A Preliminary Research on the Impact of Perception of Personal Information Leakage Incidents on the Behavior of Individual Information Management in the Mobile Banking Contexts
Kim, Jungduk;Lim, Se-Hun;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.735-744,
|
|
19 |
Redundancy assessment of PIMS and PIPL by parsing
Kim, So-Ra;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.745-756,
|
|
20 |
An Analysis of Password Meters for Domestic Web Sites
Kim, KyoungHoon;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.757-767,
|
|
21 |
A Study on the Short Term Curriculum for Strengthening Information Security Capability in Public Sector
Yun, Joobeom;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.769-776,
|
|
22 |
A Case Study on Program Outcomes Assessment of Information Security Program for Engineering Education Accreditation
Chung, Weonil;Oh, Soo-Hyun;Kim, Hwankoo;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.777-785,
|
|
23 |
Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism
Lee, Donghyeok;Park, Namje;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.787-797,
|
|
24 |
A Study on the Distribution Estimation of Personal Data Leak Incidents
Hwang, Yoon-hee;Yoo, Jinho;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.799-808,
|
|
25 |
A Case Study of the Impact of a Cybersecurity Breach on a Smart Grid Based on an AMI Attack Scenario
Jun, Hyo-Jung;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.809-820,
|
|
26 |
Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System)
Kong, Hee-Kyung;Jun, Hyo-Jung;Lee, Song-Ha;Kang, Min-Seong;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.821-835,
|
|
27 |
Effects of Lifelog Experience on Technology Satisfaction and Perception of Right to be Forgotten
Yoon, Il-han;Kwon, Sun-dong;
/
Korea Institute of Information Security and Cryptology
, v.26, no.3, pp.837-852,
|
|