|
1 |
Security Analysis of Blockchain Systems: Case Study of Cryptocurrencies
Lee, Sungbum;Lee, Boohyung;Myung, Sein;Lee, Jong-Hyouk;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.5-14,
|
|
2 |
Calculating the Approximate Probability of Differentials for ARX-Based Cipher Using SAT Solver
Lee, HoChang;Kim, Seojin;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.15-24,
|
|
3 |
High-Speed Implementation and Efficient Memory Usage of Min-Entropy Estimation Algorithms in NIST SP 800-90B
Kim, Wontae;Yeom, Yongjin;Kang, Ju-Sung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.25-39,
|
|
4 |
Optimal Implementation of Format Preserving Encryption Algorithm FEA in Various Environments
Park, Cheolhee;Jeong, Sooyong;Hong, Dowon;Seo, Changho;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.41-51,
|
|
5 |
Automated Formal Verification of Korean Standard Block Cipher Using Cryptol
Choi, Won-bin;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.53-60,
|
|
6 |
An Approach to Constructing an Efficient Entropy Source on Multicore Processor
Kim, SeongGyeom;Lee, SeungJoon;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.61-71,
|
|
7 |
An Implementation of Supersingular Isogeny Diffie-Hellman and Its Application to Mobile Security Product
Yoon, Kisoon;Lee, Jun Yeong;Kim, Suhri;Kwon, Jihoon;Park, Young-Ho;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.73-83,
|
|
8 |
An Efficient Quadratic Projection-Based Iris Recognition: Performance Improvements of Iris Recognition Using Dual QML
Kwon, Taeyean;Noh, Geontae;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.85-93,
|
|
9 |
A Study on Mobile Forensic Data Acquisition Method Based on Manufacturer's Backup Mobile App
Choi, Jaewon;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.95-110,
|
|
10 |
Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System
Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.111-122,
|
|
11 |
An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle)
Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.123-133,
|
|
12 |
Threat Modeling and Risk Analysis: PS4 Remote Play with PC
Kim, Hye Min;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.135-143,
|
|
13 |
A System for SSL/TLS Vulnerability Detection of Servers
Cho, Sungwon;Choi, Hyunsang;Heo, Gyu;Cho, Sanghyun;Kim, Young-Gab;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.145-153,
|
|
14 |
How to Cope with Ransomware in the Healthcare Industry
Jeon, In-seok;Kim, Dong-won;Han, Keun-hee;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.155-165,
|
|
15 |
Method for Inferring Format Information of Data Field from CAN Trace
Ji, Cheongmin;Kim, Jimin;Hong, Manpyo;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.167-177,
|
|
16 |
Randomness Based Fuzzing Test Case Evaluation for Vulnerability Analysis of Industrial Control System
Kim, SungJin;Shon, Taeshik;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.179-186,
|
|
17 |
Factors that Affect the Intention of Password Security Behavior
Lee, Dong-Hee;Kim, Tae-Sung;Jun, Hyo-Jung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.187-198,
|
|
18 |
An Analysis on Intention to Use Information Service for Personal Information Breach
Kim, Taek-Young;Jun, Hyo-Jung;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.199-213,
|
|
19 |
A Study on the Damage Cost Estimation Model for Personal Information Leakage in Korea
Lim, Gyoo Gun;Liu, Mei Na;Lee, Jung Mi;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.215-227,
|
|
20 |
IP-CCTV Risk Decision Model Using AHP (Cloud Computing Based)
Jung, Sung-hoo;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.229-239,
|
|
21 |
Design and Analysis a Robust Recommender System Exploiting the Effect of Social Trust Clusters
Noh, Giseop;Oh, Hayoung;Lee, Jaehoon;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.241-248,
|
|
22 |
A Study on the Framework of Comparing New Cybersecurity Workforce Development Policy Based on the ATE Programs of U.S.
Hong, Soonjwa;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.249-267,
|
|
23 |
An Empirical Study of Relationship between Information Security Investment and Information Security Incidents : A Focus on Information Security Training, Awareness and Education Service Sector
Lee, Hansol;Chai, Sangmi;
/
Korea Institute of Information Security and Cryptology
, v.28, no.1, pp.269-281,
|
|