Browse > Article List

논문
1 MILP-Espresso-Based Automatic Searching Method for Differential Charactertistics
Park, YeonJi;Lee, HoChang;Hong, Deukjo;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.533-543,
2 Memory-Efficient Implementation of Ultra-Lightweight Block Cipher Algorithm CHAM on Low-End 8-Bit AVR Processors
Seo, Hwajeong; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.545-550,
3 A Study on Attack against NTRU Signature Implementation and Its Countermeasure
Jang, Hocheol;Oh, Soohyun;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.551-561,
4 An Anonymous Authentication in the Hierarchy for VANET
Bae, Kyungjin;Lee, Youngkyung;Kim, Jonghyun;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.563-577,
5 A Study on Authentication Process in Smartphone Electronic Financial Services
Kim, Hanwoo;Lee, Keun Young;Lim, Jong In;Kwon, Hun Yeong; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.579-590,
6 Study on Windows Event Log-Based Corporate Security Audit and Malware Detection
Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.591-603,
7 Analysis of Detection Ability Impact of Clang Static Analysis Tool by Source Code Obfuscation Technique
Jin, Hongjoo;Park, Moon Chan;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.605-615,
8 Android Malware Detection Using Permission-Based Machine Learning Approach
Kang, Seongeun;Long, Nguyen Vu;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.617-623,
9 The Method of Recovery for Deleted Record of Realm Database
Kim, Junki;Han, Jaehyeok;Choi, Jong-Hyun;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.625-633,
10 Software Vulnerability Prediction System Using Machine Learning Algorithm
Choi, Minjun;Kim, Juhwan;Yun, Joobeom; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.635-642,
11 A Static Analysis Technique for Android Apps Written with Xamarin
Lim, Kyeong-hwan;Kim, Gyu-sik;Shim, Jae-woo;Cho, Seong-je; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.643-653,
12 Vulnerability Analysis of Printer Management System in Public Institutions
Ji, Woojoong;Lee, Kyungmoon;Lee, Byoungcheon; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.655-663,
13 Analysis of Privacy Violation Possibility of Partially Anonymized Big Data
Jung, Kang-soo;Park, Seog;Choi, Dae-seon; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.665-679,
14 An Experimental Study on the Effects of Risk Cognition of Personal Information and Self-Expression Information on Conation of Privacy Protection
Lim, Jung-Ho;Kwon, Sun-Dong; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.681-694,
15 Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis
Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.695-706,
16 A Study on the Concept of Social Engineering Based Cyber Operations
Shin, Kyuyong;Kang, Jungho;Yoo, Jincheol;Kim, Jeewon;Kang, Sungrok;Lim, Hyunmyung;Kim, Yongju; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.707-716,
17 A Study of Bitcoin Transaction Tracking Method through Illegal Community
Jeong, Sejin;Kwak, Nohyun;Kang, Brent Byunghoon; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.717-727,
18 Establishing Security Level Standards and Case Studies for Safe Electronic Financial Transactions
Jang, Kil-Young;Kim, In-Seok; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.729-741,
19 A Study on the Decision Making Model for the Introduction of the Financial Institution's Cloud Systems
Lee, Hee-Seok;Kim, In-Seok; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.743-763,
20 Research for Construction Cybersecurity Test and Evaluation of Weapon System
Lee, Ji-seop;Cha, Sung-yong;Baek, Seung-soo;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.28, no.3, pp.765-774,