|
1 |
Side Channel Analysis with Low Complexity in the Diffusion Layer of Block Cipher Algorithm SEED
Won, Yoo-Seung;Park, Aesun;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.993-1000,
|
|
2 |
Countermeasure against Chosen Ciphertext Spa Attack of the Public-Key Cryptosystem Based on Ring-Lwe Problem
Park, Aesun;Won, Yoo-Seung;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1001-1011,
|
|
3 |
Study on Memory Data Encryption of Windows Hibernation File
Lee, Kyoungho;Lee, Wooho;Noh, Bongnam;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1013-1022,
|
|
4 |
Masking-Based Block Cipher LEA Resistant to Side Channel Attacks
Park, Eunsoo;Oh, Soohyun;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1023-1032,
|
|
5 |
The Framework for Cost Reduction of User Authentication Using Implicit Risk Model
Kim, Pyung;Seo, Kyongjin;Cho, Jin-Man;Kim, Soo-Hyung;Lee, Younho;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1033-1047,
|
|
6 |
A Case Study on Mobile Advertisement Injection
Cho, Sanghyun;Heo, Gyu;Choi, Hyunsang;Kim, Young-Gab;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1049-1058,
|
|
7 |
A Method for Generating Robust Key from Face Image and User Intervention
Kim, Hyejin;Choi, JinChun;Jung, Chang-hun;Nyang, DaeHun;Lee, KyungHee;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1059-1068,
|
|
8 |
Fake GPS Detection for the Online Game Service on Server-Side
Han, Jaehyeok;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1069-1076,
|
|
9 |
Malware Analysis Based on Section, DLL
Hwang, Jun-ho;Hwang, Seon-bin;Kim, Ho-gyeong;Ha, Ji-hee;Lee, Tae-jin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1077-1086,
|
|
10 |
Android Malware Analysis Technology Research Based on Naive Bayes
Hwang, Jun-ho;Lee, Tae-jin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1087-1097,
|
|
11 |
Improvement Method of Forensic Accounting Using Characteristics of Accounting Programs Used in Windows System
Lee, Seung-ju;Lee, Kuk-heon;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1099-1105,
|
|
12 |
A Method of Recovery for Damaged ZIP Files
Jung, Byungjoon;Han, Jaehyeok;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1107-1115,
|
|
13 |
A Normal Network Behavior Profiling Method Based on Big Data Analysis Techniques (Hadoop/Hive)
Kim, SungJin;Kim, Kangseok;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1117-1127,
|
|
14 |
Design of a Limited Two-Way Communications System
Kim, Dongwook;Min, Byunggil;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1129-1140,
|
|
15 |
A Legislative Proposal to Prevent the Infringement of Privacy and to Solve Operational Problems by Drones
Kim, Yongho;Rhee, Kyung-Hyune;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1141-1147,
|
|
16 |
Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment
Park, Tae-hwan;Lee, Ga-ram;Kim, Ho-won;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1149-1155,
|
|
17 |
Comparing Qualifications of Korea and US Information Security Consultants: Focused on Job Ads
Lim, Jae-Jung;Kim, Ha-Young;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1157-1166,
|
|
18 |
Factors that Affect Sharing Cyber Threat Information in South Korea
Kim, Ha-Young;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1167-1188,
|
|
19 |
A Survey of Regulations on Smishing and Mobile Micropayment and a Research of Regulations and Laws for Reducing Monetary Damages in Mobile Micropayment
Park, Hanjin;Kim, Injung;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1189-1199,
|
|
20 |
Countermeasures against Security Threats to Online Voting Using Distributed Ledger Technology
Park, Keundug;Kim, ChangOh;Youm, Heung-youl;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1201-1216,
|
|
21 |
Exploring the Moderating Effect of Security Awareness on Trust and Service Value in Website
Park, Jun-Gi;Lee, Hyejung;Kim, Gibum;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1217-1232,
|
|
22 |
Risk Management Requirements for Cyber Insurance
Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.27, no.5, pp.1233-1245,
|
|