|
1 |
Implementation and Evaluation of IoT Service System for Security Enhancement
Kim, Jin-bo;Kim, Mi-sun;Seo, Jae-hyun;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.181-192,
|
|
2 |
Error Detection Architecture for Modular Operations
Kim, Chang Han;Chang, Nam Su;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.193-199,
|
|
3 |
Biometric User Authentication Method of Mobile Application in Trustable Space
Lee, Tae Kyong;Kim, Yong Hyuk;Im, Eul Gyu;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.201-212,
|
|
4 |
A Study on Internet Advertisement Injection
Cho, Sanghyun;Choi, Hyunsang;Kim, Young-Gab;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.213-222,
|
|
5 |
Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server
Shin, Jiho;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.223-232,
|
|
6 |
Fingerprint Smudge Attacks Based on Fingerprint Image Reconstruction on Smart Devices
Lee, Hoyeon;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.233-240,
|
|
7 |
Cyber Security Framework for Critical Infrastructure
Kwon, Sungmoon;Lee, Seokcheol;Jang, Jiwoong;Shon, Taeshik;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.241-250,
|
|
8 |
How to Detect and Block Ransomware with File Extension Management in MacOS
Youn, Jung-moo;Ryu, Jae-cheol;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.251-258,
|
|
9 |
Game Theory-Based Vulnerability Quantification Method Using Attack Tree
Lee, Seokcheol;Lee, Sang-Ha;Shon, Taeshik;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.259-266,
|
|
10 |
A Study on the Change of Capability and Behavior against Phishing Attack by Continuous Practical Simulation Training
Yoon, Duck-sang;Lee, Kyung-ho;Lim, Jong-in;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.267-279,
|
|
11 |
Analysis of Influencing Factors of Cyber Weapon System Core Technology Realization Period
Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.281-292,
|
|
12 |
Certified Key Management in Multi K-FIDO Device Environment
Lee, Byoungcheon;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.293-303,
|
|
13 |
Data Mixing Augmentation Method for Improving Fake Fingerprint Detection Rate
Kim, Weonjin;Jin, Cheng-Bin;Liu, Jinsong;Kim, Hakil;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.305-314,
|
|
14 |
OTP-Based Dynamic Authentication Framework for Virtual Machine Migration
Lee, Eun-Ji;Park, Choon-Sik;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.315-327,
|
|
15 |
A Study on the Smartcard-Based Authentication Protocol Design with Advanced Security in the Multiple Server Environments
Bae, Won-il;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.329-341,
|
|
16 |
Blockchain-Based IoT Device Authentication Scheme
Park, Byeong-ju;Lee, Tae-jin;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.343-351,
|
|
17 |
Key Management for Secure Internet of Things(IoT) Data in Cloud Computing
Sung, Soon-hwa;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.353-360,
|
|
18 |
A Study of Behavior Based Authentication Using Touch Dynamics and Application Usage on Android
Kim, Minwoo;Kim, Seungyeon;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.361-371,
|
|
19 |
Integrated Authentication Protocol of Financial Sector that Modified OAuth2.0
Jung, Kyu-Won;Shin, Hye-seong;Park, Jong Hwan;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.373-381,
|
|
20 |
An Incremental Elimination Method of EEG Samples Collected by Single-Channel EEG Measurement Device for Practical Brainwave-Based User Authentication
Ko, Han-Gyu;Cho, Jin-Man;Choi, Daeseon;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.383-395,
|
|
21 |
Secure and Efficient Binding Updates in Host-Based Distributed Mobility Management
Lee, Seyeong;Choi, Hyoung-Kee;Kim, EJin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.2, pp.397-408,
|
|