Browse > Article List

논문
1 Implementation and Evaluation of IoT Service System for Security Enhancement
Kim, Jin-bo;Kim, Mi-sun;Seo, Jae-hyun; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.181-192,
2 Error Detection Architecture for Modular Operations
Kim, Chang Han;Chang, Nam Su; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.193-199,
3 Biometric User Authentication Method of Mobile Application in Trustable Space
Lee, Tae Kyong;Kim, Yong Hyuk;Im, Eul Gyu; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.201-212,
4 A Study on Internet Advertisement Injection
Cho, Sanghyun;Choi, Hyunsang;Kim, Young-Gab; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.213-222,
5 Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server
Shin, Jiho; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.223-232,
6 Fingerprint Smudge Attacks Based on Fingerprint Image Reconstruction on Smart Devices
Lee, Hoyeon;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.233-240,
7 Cyber Security Framework for Critical Infrastructure
Kwon, Sungmoon;Lee, Seokcheol;Jang, Jiwoong;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.241-250,
8 How to Detect and Block Ransomware with File Extension Management in MacOS
Youn, Jung-moo;Ryu, Jae-cheol; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.251-258,
9 Game Theory-Based Vulnerability Quantification Method Using Attack Tree
Lee, Seokcheol;Lee, Sang-Ha;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.259-266,
10 A Study on the Change of Capability and Behavior against Phishing Attack by Continuous Practical Simulation Training
Yoon, Duck-sang;Lee, Kyung-ho;Lim, Jong-in; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.267-279,
11 Analysis of Influencing Factors of Cyber Weapon System Core Technology Realization Period
Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.281-292,
12 Certified Key Management in Multi K-FIDO Device Environment
Lee, Byoungcheon; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.293-303,
13 Data Mixing Augmentation Method for Improving Fake Fingerprint Detection Rate
Kim, Weonjin;Jin, Cheng-Bin;Liu, Jinsong;Kim, Hakil; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.305-314,
14 OTP-Based Dynamic Authentication Framework for Virtual Machine Migration
Lee, Eun-Ji;Park, Choon-Sik;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.315-327,
15 A Study on the Smartcard-Based Authentication Protocol Design with Advanced Security in the Multiple Server Environments
Bae, Won-il;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.329-341,
16 Blockchain-Based IoT Device Authentication Scheme
Park, Byeong-ju;Lee, Tae-jin;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.343-351,
17 Key Management for Secure Internet of Things(IoT) Data in Cloud Computing
Sung, Soon-hwa; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.353-360,
18 A Study of Behavior Based Authentication Using Touch Dynamics and Application Usage on Android
Kim, Minwoo;Kim, Seungyeon;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.361-371,
19 Integrated Authentication Protocol of Financial Sector that Modified OAuth2.0
Jung, Kyu-Won;Shin, Hye-seong;Park, Jong Hwan; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.373-381,
20 An Incremental Elimination Method of EEG Samples Collected by Single-Channel EEG Measurement Device for Practical Brainwave-Based User Authentication
Ko, Han-Gyu;Cho, Jin-Man;Choi, Daeseon; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.383-395,
21 Secure and Efficient Binding Updates in Host-Based Distributed Mobility Management
Lee, Seyeong;Choi, Hyoung-Kee;Kim, EJin; / Korea Institute of Information Security and Cryptology , v.27, no.2, pp.397-408,