Browse > Article List

논문
1 Analysis on Vulnerability of Password Entry Using Virtual Onscreen Keyboard
Shakirov, Bobur;Kim, Hyejin;Lee, KyungHee;Nyang, DaeHun; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.857-869,
2 Building of Remote Control Attack System for 2.4 GHz Wireless Keyboard Using an Android Smart Phone
Lee, Su-Jin;Park, Aesun;Sim, Bo-Yeon;Kim, Sang-su;Oh, Seung-Sup;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.871-883,
3 A Study on Identification of the Source of Videos Recorded by Smartphones
Kim, Hyeon-seung;Choi, Jong-hyun;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.885-894,
4 Efficient Detection of Android Mutant Malwares Using the DEX file
Park, Dong-Hyeok;Myeong, Eui-Jung;Yun, Joobeom; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.895-902,
5 Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems
Jung, Sungmi;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.903-910,
6 Improving the Efficiency of the EWF-file Imaging Time from a Cryptographic Perspective
Shin, Yonghak;Kim, Dowon;Lee, Changhoon;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.911-919,
7 Design and Implementation of Verification System for Malicious URL and Modified APK File on Cloud Platform
Je, Seolah;Nguyen, Vu Long;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.921-928,
8 A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud
Lee, Donghyeok;Park, Namje; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.929-940,
9 Analysis of Security Issues in Wireless Charging of Electric Vehicles on the Move
Rezeifar, Zeinab;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.941-951,
10 Bipartite Preference aware Robust Recommendation System
Lee, Jaehoon;Oh, Hayoung;Kim, Chong-kwon; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.953-960,
11 A Case Study of Password Usage for Domestic Users
Kim, Seung-Yeon;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.961-972,
12 Problems and Improvement of Privacy Impact Assessment
Choi, Young-hee;Han, Keun-hee; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.973-983,
13 Comparison Study between the Cyber Weapon System and the Conventional Weapons Systems on Their Core Technologies Levels and Features
Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.985-994,
14 Improving Personal Data Protection in IoT Environments
Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.995-1012,
15 A Study on Transborder Data Flow of Personal Information: Policy Suggestion based on EU's Approach
Lee, Sang-Hyuk;Kim, In-Seok; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.1013-1023,
16 Implementation of the Personal Information Infringement Detection Module in the HTML5 Web Service Environment
Han, Mee Lan;Kwak, Byung Il;Kim, Hwan Kuk;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.1025-1036,
17 An Analysis of the Public Awareness on National Policy on Protection of Personal Information: using SERVQUAL
Lee, Kyung-bok;Yoon, Ki-chan;Shim, Mina;Lim, Jong-in;Park, Tae Hyoung; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.1037-1055,
18 Privacy Protection from Unmanned Aerial Vehicle
Lee, Bosung;Lee, Joongyeup;Park, Yujin;Kim, Beomsoo; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.1057-1071,
19 A Study of the Research the Right to be Forgotten from 2010
Shim, Mina; / Korea Institute of Information Security and Cryptology , v.26, no.4, pp.1073-1084,