Browse > Article List

논문
1 Side Channel Analysis with Low Complexity in the Diffusion Layer of Block Cipher Algorithm SEED
Won, Yoo-Seung;Park, Aesun;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.993-1000,
2 Countermeasure against Chosen Ciphertext Spa Attack of the Public-Key Cryptosystem Based on Ring-Lwe Problem
Park, Aesun;Won, Yoo-Seung;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1001-1011,
3 Study on Memory Data Encryption of Windows Hibernation File
Lee, Kyoungho;Lee, Wooho;Noh, Bongnam; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1013-1022,
4 Masking-Based Block Cipher LEA Resistant to Side Channel Attacks
Park, Eunsoo;Oh, Soohyun;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1023-1032,
5 The Framework for Cost Reduction of User Authentication Using Implicit Risk Model
Kim, Pyung;Seo, Kyongjin;Cho, Jin-Man;Kim, Soo-Hyung;Lee, Younho; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1033-1047,
6 A Case Study on Mobile Advertisement Injection
Cho, Sanghyun;Heo, Gyu;Choi, Hyunsang;Kim, Young-Gab; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1049-1058,
7 A Method for Generating Robust Key from Face Image and User Intervention
Kim, Hyejin;Choi, JinChun;Jung, Chang-hun;Nyang, DaeHun;Lee, KyungHee; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1059-1068,
8 Fake GPS Detection for the Online Game Service on Server-Side
Han, Jaehyeok;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1069-1076,
9 Malware Analysis Based on Section, DLL
Hwang, Jun-ho;Hwang, Seon-bin;Kim, Ho-gyeong;Ha, Ji-hee;Lee, Tae-jin; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1077-1086,
10 Android Malware Analysis Technology Research Based on Naive Bayes
Hwang, Jun-ho;Lee, Tae-jin; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1087-1097,
11 Improvement Method of Forensic Accounting Using Characteristics of Accounting Programs Used in Windows System
Lee, Seung-ju;Lee, Kuk-heon;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1099-1105,
12 A Method of Recovery for Damaged ZIP Files
Jung, Byungjoon;Han, Jaehyeok;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1107-1115,
13 A Normal Network Behavior Profiling Method Based on Big Data Analysis Techniques (Hadoop/Hive)
Kim, SungJin;Kim, Kangseok; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1117-1127,
14 Design of a Limited Two-Way Communications System
Kim, Dongwook;Min, Byunggil; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1129-1140,
15 A Legislative Proposal to Prevent the Infringement of Privacy and to Solve Operational Problems by Drones
Kim, Yongho;Rhee, Kyung-Hyune; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1141-1147,
16 Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment
Park, Tae-hwan;Lee, Ga-ram;Kim, Ho-won; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1149-1155,
17 Comparing Qualifications of Korea and US Information Security Consultants: Focused on Job Ads
Lim, Jae-Jung;Kim, Ha-Young;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1157-1166,
18 Factors that Affect Sharing Cyber Threat Information in South Korea
Kim, Ha-Young;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1167-1188,
19 A Survey of Regulations on Smishing and Mobile Micropayment and a Research of Regulations and Laws for Reducing Monetary Damages in Mobile Micropayment
Park, Hanjin;Kim, Injung; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1189-1199,
20 Countermeasures against Security Threats to Online Voting Using Distributed Ledger Technology
Park, Keundug;Kim, ChangOh;Youm, Heung-youl; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1201-1216,
21 Exploring the Moderating Effect of Security Awareness on Trust and Service Value in Website
Park, Jun-Gi;Lee, Hyejung;Kim, Gibum; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1217-1232,
22 Risk Management Requirements for Cyber Insurance
Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.27, no.5, pp.1233-1245,