Browse > Article List

논문
1 Key Recovery Algorithm of Erroneous RSA Private Key Bits Using Generalized Probabilistic Measure
Baek, Yoo-Jin; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1089-1097,
2 Vulnerability of Carry Random Scalar Recoding Method against Differential Power Analysis Attack
Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1099-1103,
3 SEAndroid Policy Protection Architecture Design and Implementation in Android
Yoo, Seok-man;Park, Jin-Hyung;Lee, Dong-hoon; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1105-1119,
4 Enhanced Polynomial Selection Method for GNFS
Kim, Suhri;Kwon, Jihoon;Cho, Sungmin;Chang, Nam Su;Yoon, Kisoon;Han, Chang;Park, Young-Ho;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1121-1130,
5 Study on Forensic Analysis with Access Control Modification for Registry
Kim, Hangi;Kim, Do-Won;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1131-1139,
6 Sanitization of Open-Source Based Deduplicated Filesystem
Cho, Hyeonwoong;Kim, SeulGi;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1141-1149,
7 A Snoop-Based Kernel Introspection System against Address Translation Redirection Attack
Kim, Donguk;Kim, Jihoon;Park, Jinbum;Kim, Jinmok; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1151-1160,
8 Mobile Finger Signature Verification Robust to Skilled Forgery
Nam, Seng-soo;Seo, Chang-ho;Choi, Dae-seon; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1161-1170,
9 Effective Domestic e-Discovery Procedures
Lee, Shin-Hyung;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1171-1183,
10 A Base Address Analysis Tool for Static Analysis of ARM Architecture-Based Binary
Kang, Ji-Hun;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1185-1189,
11 Author Identification Using Artificial Neural Network
Jung, Jisoo;Yoon, Ji Won; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1191-1199,
12 Research on Protocol Conversion Gateway based on IEEE1815.1
Lee, Seokjun;Kwon, Sungmoon;Shon, Taeshik;Park, Sungwan; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1201-1209,
13 Software Code Attestation for IoT Devices by Bluetooth Low Energy
Kim, GeunYoung;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1211-1221,
14 Traffic Analysis Architecture for Secure Industrial Control System
Lee, Eun-Ji;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1223-1234,
15 Relationship Analysis between Malware and Sybil for Android Apps Recommender System
Oh, Hayoung; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1235-1241,
16 The Influence of Abusive Supervision on Willingness to Comply with the Security Policy: the Moderation of Organizational Justice
Kim, Youngsoo;Choi, Youngkeun;Yoo, Taejong;Yoo, Jinho; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1243-1250,
17 An Investigation of the Psychology of Password Replacement by Email Users
Lim, Se Hun; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1251-1258,
18 Fingerprint Liveness Detection and Visualization Using Convolutional Neural Networks Feature
Kim, Weon-jin;Li, Qiong-xiu;Park, Eun-soo;Kim, Jung-min;Kim, Hak-il; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1259-1267,
19 EU-US Privacy Shield Agreement and Domestic Policy Direction
YUN, Jaesuk; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1269-1277,
20 Research on Expansion and Improvement Approaches of Information Security Budget for Cybersecurity Enhancement
Bae, Sunha;KIM, So Jeong; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1279-1294,
21 A Study on One-way Communication using Commercial Off The Shelf Network Interface Card
Kim, Jin-hong;Na, Jung-chan;Lee, Seoung-Hyeon; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1295-1304,
22 Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network
Shim, Jae-Yoon;Lee, June-Kyoung; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1305-1311,
23 Preprocessor Implementation of Open IDS Snort for Smart Manufacturing Industry Network
Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1313-1322,
24 Study on Minimum Security Requirement Using Risk Priority Number(SFRPN) for Secure Smart Factory
Yi, Byung-gueon;Kim, Dong-won;Noh, Bong-nam; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1323-1333,
25 Curriculum Development for Smart Factory Information Security Awareness Training
Jeon, In-seok;Yi, Byung-gueon;Kim, Dong-won;Choi, Jin-yung; / Korea Institute of Information Security and Cryptology , v.26, no.5, pp.1335-1348,