|
1 |
Key Recovery Algorithm of Erroneous RSA Private Key Bits Using Generalized Probabilistic Measure
Baek, Yoo-Jin;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1089-1097,
|
|
2 |
Vulnerability of Carry Random Scalar Recoding Method against Differential Power Analysis Attack
Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1099-1103,
|
|
3 |
SEAndroid Policy Protection Architecture Design and Implementation in Android
Yoo, Seok-man;Park, Jin-Hyung;Lee, Dong-hoon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1105-1119,
|
|
4 |
Enhanced Polynomial Selection Method for GNFS
Kim, Suhri;Kwon, Jihoon;Cho, Sungmin;Chang, Nam Su;Yoon, Kisoon;Han, Chang;Park, Young-Ho;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1121-1130,
|
|
5 |
Study on Forensic Analysis with Access Control Modification for Registry
Kim, Hangi;Kim, Do-Won;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1131-1139,
|
|
6 |
Sanitization of Open-Source Based Deduplicated Filesystem
Cho, Hyeonwoong;Kim, SeulGi;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1141-1149,
|
|
7 |
A Snoop-Based Kernel Introspection System against Address Translation Redirection Attack
Kim, Donguk;Kim, Jihoon;Park, Jinbum;Kim, Jinmok;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1151-1160,
|
|
8 |
Mobile Finger Signature Verification Robust to Skilled Forgery
Nam, Seng-soo;Seo, Chang-ho;Choi, Dae-seon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1161-1170,
|
|
9 |
Effective Domestic e-Discovery Procedures
Lee, Shin-Hyung;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1171-1183,
|
|
10 |
A Base Address Analysis Tool for Static Analysis of ARM Architecture-Based Binary
Kang, Ji-Hun;Ryou, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1185-1189,
|
|
11 |
Author Identification Using Artificial Neural Network
Jung, Jisoo;Yoon, Ji Won;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1191-1199,
|
|
12 |
Research on Protocol Conversion Gateway based on IEEE1815.1
Lee, Seokjun;Kwon, Sungmoon;Shon, Taeshik;Park, Sungwan;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1201-1209,
|
|
13 |
Software Code Attestation for IoT Devices by Bluetooth Low Energy
Kim, GeunYoung;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1211-1221,
|
|
14 |
Traffic Analysis Architecture for Secure Industrial Control System
Lee, Eun-Ji;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1223-1234,
|
|
15 |
Relationship Analysis between Malware and Sybil for Android Apps Recommender System
Oh, Hayoung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1235-1241,
|
|
16 |
The Influence of Abusive Supervision on Willingness to Comply with the Security Policy: the Moderation of Organizational Justice
Kim, Youngsoo;Choi, Youngkeun;Yoo, Taejong;Yoo, Jinho;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1243-1250,
|
|
17 |
An Investigation of the Psychology of Password Replacement by Email Users
Lim, Se Hun;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1251-1258,
|
|
18 |
Fingerprint Liveness Detection and Visualization Using Convolutional Neural Networks Feature
Kim, Weon-jin;Li, Qiong-xiu;Park, Eun-soo;Kim, Jung-min;Kim, Hak-il;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1259-1267,
|
|
19 |
EU-US Privacy Shield Agreement and Domestic Policy Direction
YUN, Jaesuk;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1269-1277,
|
|
20 |
Research on Expansion and Improvement Approaches of Information Security Budget for Cybersecurity Enhancement
Bae, Sunha;KIM, So Jeong;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1279-1294,
|
|
21 |
A Study on One-way Communication using Commercial Off The Shelf Network Interface Card
Kim, Jin-hong;Na, Jung-chan;Lee, Seoung-Hyeon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1295-1304,
|
|
22 |
Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network
Shim, Jae-Yoon;Lee, June-Kyoung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1305-1311,
|
|
23 |
Preprocessor Implementation of Open IDS Snort for Smart Manufacturing Industry Network
Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1313-1322,
|
|
24 |
Study on Minimum Security Requirement Using Risk Priority Number(SFRPN) for Secure Smart Factory
Yi, Byung-gueon;Kim, Dong-won;Noh, Bong-nam;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1323-1333,
|
|
25 |
Curriculum Development for Smart Factory Information Security Awareness Training
Jeon, In-seok;Yi, Byung-gueon;Kim, Dong-won;Choi, Jin-yung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.5, pp.1335-1348,
|
|