|
1 |
MILP-Espresso-Based Automatic Searching Method for Differential Charactertistics
Park, YeonJi;Lee, HoChang;Hong, Deukjo;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.533-543,
|
|
2 |
Memory-Efficient Implementation of Ultra-Lightweight Block Cipher Algorithm CHAM on Low-End 8-Bit AVR Processors
Seo, Hwajeong;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.545-550,
|
|
3 |
A Study on Attack against NTRU Signature Implementation and Its Countermeasure
Jang, Hocheol;Oh, Soohyun;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.551-561,
|
|
4 |
An Anonymous Authentication in the Hierarchy for VANET
Bae, Kyungjin;Lee, Youngkyung;Kim, Jonghyun;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.563-577,
|
|
5 |
A Study on Authentication Process in Smartphone Electronic Financial Services
Kim, Hanwoo;Lee, Keun Young;Lim, Jong In;Kwon, Hun Yeong;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.579-590,
|
|
6 |
Study on Windows Event Log-Based Corporate Security Audit and Malware Detection
Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.591-603,
|
|
7 |
Analysis of Detection Ability Impact of Clang Static Analysis Tool by Source Code Obfuscation Technique
Jin, Hongjoo;Park, Moon Chan;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.605-615,
|
|
8 |
Android Malware Detection Using Permission-Based Machine Learning Approach
Kang, Seongeun;Long, Nguyen Vu;Jung, Souhwan;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.617-623,
|
|
9 |
The Method of Recovery for Deleted Record of Realm Database
Kim, Junki;Han, Jaehyeok;Choi, Jong-Hyun;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.625-633,
|
|
10 |
Software Vulnerability Prediction System Using Machine Learning Algorithm
Choi, Minjun;Kim, Juhwan;Yun, Joobeom;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.635-642,
|
|
11 |
A Static Analysis Technique for Android Apps Written with Xamarin
Lim, Kyeong-hwan;Kim, Gyu-sik;Shim, Jae-woo;Cho, Seong-je;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.643-653,
|
|
12 |
Vulnerability Analysis of Printer Management System in Public Institutions
Ji, Woojoong;Lee, Kyungmoon;Lee, Byoungcheon;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.655-663,
|
|
13 |
Analysis of Privacy Violation Possibility of Partially Anonymized Big Data
Jung, Kang-soo;Park, Seog;Choi, Dae-seon;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.665-679,
|
|
14 |
An Experimental Study on the Effects of Risk Cognition of Personal Information and Self-Expression Information on Conation of Privacy Protection
Lim, Jung-Ho;Kwon, Sun-Dong;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.681-694,
|
|
15 |
Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis
Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.695-706,
|
|
16 |
A Study on the Concept of Social Engineering Based Cyber Operations
Shin, Kyuyong;Kang, Jungho;Yoo, Jincheol;Kim, Jeewon;Kang, Sungrok;Lim, Hyunmyung;Kim, Yongju;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.707-716,
|
|
17 |
A Study of Bitcoin Transaction Tracking Method through Illegal Community
Jeong, Sejin;Kwak, Nohyun;Kang, Brent Byunghoon;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.717-727,
|
|
18 |
Establishing Security Level Standards and Case Studies for Safe Electronic Financial Transactions
Jang, Kil-Young;Kim, In-Seok;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.729-741,
|
|
19 |
A Study on the Decision Making Model for the Introduction of the Financial Institution's Cloud Systems
Lee, Hee-Seok;Kim, In-Seok;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.743-763,
|
|
20 |
Research for Construction Cybersecurity Test and Evaluation of Weapon System
Lee, Ji-seop;Cha, Sung-yong;Baek, Seung-soo;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.28, no.3, pp.765-774,
|
|