|
1 |
Analysis on Vulnerability of Password Entry Using Virtual Onscreen Keyboard
Shakirov, Bobur;Kim, Hyejin;Lee, KyungHee;Nyang, DaeHun;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.857-869,
|
|
2 |
Building of Remote Control Attack System for 2.4 GHz Wireless Keyboard Using an Android Smart Phone
Lee, Su-Jin;Park, Aesun;Sim, Bo-Yeon;Kim, Sang-su;Oh, Seung-Sup;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.871-883,
|
|
3 |
A Study on Identification of the Source of Videos Recorded by Smartphones
Kim, Hyeon-seung;Choi, Jong-hyun;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.885-894,
|
|
4 |
Efficient Detection of Android Mutant Malwares Using the DEX file
Park, Dong-Hyeok;Myeong, Eui-Jung;Yun, Joobeom;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.895-902,
|
|
5 |
Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems
Jung, Sungmi;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.903-910,
|
|
6 |
Improving the Efficiency of the EWF-file Imaging Time from a Cryptographic Perspective
Shin, Yonghak;Kim, Dowon;Lee, Changhoon;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.911-919,
|
|
7 |
Design and Implementation of Verification System for Malicious URL and Modified APK File on Cloud Platform
Je, Seolah;Nguyen, Vu Long;Jung, Souhwan;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.921-928,
|
|
8 |
A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud
Lee, Donghyeok;Park, Namje;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.929-940,
|
|
9 |
Analysis of Security Issues in Wireless Charging of Electric Vehicles on the Move
Rezeifar, Zeinab;Oh, Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.941-951,
|
|
10 |
Bipartite Preference aware Robust Recommendation System
Lee, Jaehoon;Oh, Hayoung;Kim, Chong-kwon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.953-960,
|
|
11 |
A Case Study of Password Usage for Domestic Users
Kim, Seung-Yeon;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.961-972,
|
|
12 |
Problems and Improvement of Privacy Impact Assessment
Choi, Young-hee;Han, Keun-hee;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.973-983,
|
|
13 |
Comparison Study between the Cyber Weapon System and the Conventional Weapons Systems on Their Core Technologies Levels and Features
Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.985-994,
|
|
14 |
Improving Personal Data Protection in IoT Environments
Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.995-1012,
|
|
15 |
A Study on Transborder Data Flow of Personal Information: Policy Suggestion based on EU's Approach
Lee, Sang-Hyuk;Kim, In-Seok;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.1013-1023,
|
|
16 |
Implementation of the Personal Information Infringement Detection Module in the HTML5 Web Service Environment
Han, Mee Lan;Kwak, Byung Il;Kim, Hwan Kuk;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.1025-1036,
|
|
17 |
An Analysis of the Public Awareness on National Policy on Protection of Personal Information: using SERVQUAL
Lee, Kyung-bok;Yoon, Ki-chan;Shim, Mina;Lim, Jong-in;Park, Tae Hyoung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.1037-1055,
|
|
18 |
Privacy Protection from Unmanned Aerial Vehicle
Lee, Bosung;Lee, Joongyeup;Park, Yujin;Kim, Beomsoo;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.1057-1071,
|
|
19 |
A Study of the Research the Right to be Forgotten from 2010
Shim, Mina;
/
Korea Institute of Information Security and Cryptology
, v.26, no.4, pp.1073-1084,
|
|