|
1 |
One-Time Password Authentication Scheme Based on Cryptographic Hash Chain without Re-Registration
Shin, Dong-jin;Park, Chang-seop;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1251-1259,
|
|
2 |
Meet-in-the-Middle Attacks on Generalized Feistel Networks
Sung, Jaechul;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1261-1269,
|
|
3 |
A Hiding Original App Method by Altering Android DexClassLoader Execution Flow
Jo, Honglae;Choi, Joontae;Ha, Dongsoo;Shin, Jinseop;Oh, Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1271-1280,
|
|
4 |
Accountable Authority Revocable Identity-Based Encryption
Choi, Suri;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1281-1293,
|
|
5 |
A Study on S-Function in SEED Cryptosystem
Yang, Jeong-Mo;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1295-1305,
|
|
6 |
Access Control Mechanism for Secure CoAP Applications Based on DTLS
Jeong, Yeon-seong;Park, Chang-seop;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1307-1315,
|
|
7 |
Study on Collecting Server Information through Banner Grabbing
Kang, HongGoo;Kim, HyeonHak;Lee, HyunSeung;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1317-1330,
|
|
8 |
Instrumentation Performance Measurement Technique for Evaluating Efficiency of Binary Analysis Tools
Lee, Minsu;Lee, Jehyun;Kim, Hobin;Ryu, Chanho;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1331-1345,
|
|
9 |
The Research on Data Concealing and Detection of SQLite Database
Lee, Jae-hyoung;Cho, Jaehyung;Hong, Kiwon;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1347-1359,
|
|
10 |
Android Application Code Protection Scheme Using Fingerprint Authentication and Dynamic Loading
Lyoo, Hwahn-il;Suk, Jae-Hyuk;Park, Jin-Hyung;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1361-1372,
|
|
11 |
A Study of Method to Restore Deduplicated Files in Windows Server 2012
Son, Gwancheol;Han, Jaehyeok;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1373-1383,
|
|
12 |
Machine Learning Based Intrusion Detection Systems for Class Imbalanced Datasets
Cheong, Yun-Gyung;Park, Kinam;Kim, Hyunjoo;Kim, Jonghyun;Hyun, Sangwon;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1385-1395,
|
|
13 |
Development of a Set of Data for Verifying Partition Recovery Tool and Evaluation of Recovery Tool
Park, Songyee;Hur, Gimin;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1397-1404,
|
|
14 |
A Study on Estimation of Gait Acceleration Signal Using Gait Video Signal in Wearable Device
Lee, Duhyeong;Choi, Wonsuk;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1405-1417,
|
|
15 |
A Study on Unconsciousness Authentication Technique Using Machine Learning in Online Easy Payment Service
Ryu, Gwonsang;Seo, Changho;Choi, Daeseon;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1419-1429,
|
|
16 |
Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games
Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1431-1439,
|
|
17 |
A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling
Cha, Ye-Seul;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1441-1455,
|
|
18 |
An Application Obfuscation Method Using Security Token for Encryption in Android
Shin, JinSeop;Ahn, Jaehwan;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1457-1465,
|
|
19 |
Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling
Park, Eun-ju;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1467-1482,
|
|
20 |
Data Analysis and Risk Assessment of Smartwatch
Lee, Youngjoo;Yang, Wonseok;Kwon, Teakyoung;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1483-1490,
|
|
21 |
Trend Analysis of Malwares in Social Information Based Android Market
Oh, Hayoung;Goo, EunHee;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1491-1498,
|
|
22 |
POMDP Based Trustworthy Android App Recommendation Services
Oh, Hayoung;Goo, EunHee;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1499-1506,
|
|
23 |
Factors Affecting Information Breach Intention: Based on General Deterrence Theory and Rational Choice Theory
Kim, June-Young;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1507-1517,
|
|
24 |
A Study on a Differentially Private Model for Financial Data
Kim, Hyun-il;Park, Cheolhee;Hong, Dowon;Choi, Daeseon;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1519-1534,
|
|
25 |
Quality Evaluation Model on Information Protection Product
Yoon, Hyung-Deuk;Lee, kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.27, no.6, pp.1535-1547,
|
|