Browse > Article List

논문
1 One-Time Password Authentication Scheme Based on Cryptographic Hash Chain without Re-Registration
Shin, Dong-jin;Park, Chang-seop; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1251-1259,
2 Meet-in-the-Middle Attacks on Generalized Feistel Networks
Sung, Jaechul; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1261-1269,
3 A Hiding Original App Method by Altering Android DexClassLoader Execution Flow
Jo, Honglae;Choi, Joontae;Ha, Dongsoo;Shin, Jinseop;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1271-1280,
4 Accountable Authority Revocable Identity-Based Encryption
Choi, Suri;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1281-1293,
5 A Study on S-Function in SEED Cryptosystem
Yang, Jeong-Mo; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1295-1305,
6 Access Control Mechanism for Secure CoAP Applications Based on DTLS
Jeong, Yeon-seong;Park, Chang-seop; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1307-1315,
7 Study on Collecting Server Information through Banner Grabbing
Kang, HongGoo;Kim, HyeonHak;Lee, HyunSeung;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1317-1330,
8 Instrumentation Performance Measurement Technique for Evaluating Efficiency of Binary Analysis Tools
Lee, Minsu;Lee, Jehyun;Kim, Hobin;Ryu, Chanho; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1331-1345,
9 The Research on Data Concealing and Detection of SQLite Database
Lee, Jae-hyoung;Cho, Jaehyung;Hong, Kiwon;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1347-1359,
10 Android Application Code Protection Scheme Using Fingerprint Authentication and Dynamic Loading
Lyoo, Hwahn-il;Suk, Jae-Hyuk;Park, Jin-Hyung;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1361-1372,
11 A Study of Method to Restore Deduplicated Files in Windows Server 2012
Son, Gwancheol;Han, Jaehyeok;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1373-1383,
12 Machine Learning Based Intrusion Detection Systems for Class Imbalanced Datasets
Cheong, Yun-Gyung;Park, Kinam;Kim, Hyunjoo;Kim, Jonghyun;Hyun, Sangwon; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1385-1395,
13 Development of a Set of Data for Verifying Partition Recovery Tool and Evaluation of Recovery Tool
Park, Songyee;Hur, Gimin;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1397-1404,
14 A Study on Estimation of Gait Acceleration Signal Using Gait Video Signal in Wearable Device
Lee, Duhyeong;Choi, Wonsuk;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1405-1417,
15 A Study on Unconsciousness Authentication Technique Using Machine Learning in Online Easy Payment Service
Ryu, Gwonsang;Seo, Changho;Choi, Daeseon; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1419-1429,
16 Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games
Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1431-1439,
17 A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling
Cha, Ye-Seul;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1441-1455,
18 An Application Obfuscation Method Using Security Token for Encryption in Android
Shin, JinSeop;Ahn, Jaehwan; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1457-1465,
19 Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling
Park, Eun-ju;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1467-1482,
20 Data Analysis and Risk Assessment of Smartwatch
Lee, Youngjoo;Yang, Wonseok;Kwon, Teakyoung; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1483-1490,
21 Trend Analysis of Malwares in Social Information Based Android Market
Oh, Hayoung;Goo, EunHee; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1491-1498,
22 POMDP Based Trustworthy Android App Recommendation Services
Oh, Hayoung;Goo, EunHee; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1499-1506,
23 Factors Affecting Information Breach Intention: Based on General Deterrence Theory and Rational Choice Theory
Kim, June-Young;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1507-1517,
24 A Study on a Differentially Private Model for Financial Data
Kim, Hyun-il;Park, Cheolhee;Hong, Dowon;Choi, Daeseon; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1519-1534,
25 Quality Evaluation Model on Information Protection Product
Yoon, Hyung-Deuk;Lee, kyung-ho; / Korea Institute of Information Security and Cryptology , v.27, no.6, pp.1535-1547,