Browse > Article List

논문
1 An Intramural Electronic Voting System Based on Blockchain
Sung, Ki-jeong;Jeong, Chae-rin;Cho, Eun-a;Lee, Jong-ho;Kim, Hee-young;Kim, Young-woo;Rhee, Kyung-hyune; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.779-787,
2 IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme
Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.789-801,
3 Key Recovery Attacks on Fantomas and Robin Using Related-Key Differentials
Kim, Hangi;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.803-807,
4 A Study on the Entropy Evaluation Method for Time-Dependent Noise Sources of Windows Operating System and It's Applications
Kim, Yewon;Yeom, Yongjin; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.809-826,
5 A Study on Method for Bypassing Verification Function by Manipulating Return Value of Android Payment Application's Security Solution
You, Jaewook;Han, Mijeong;Kim, Kyuheon;Jang, Junyoung;Jin, Hoyong;Ji, Hanbyeol;Shin, Jeonghoon;Kim, Kyounggon; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.827-838,
6 Digital Evidence Collection Procedure for Hardware Unique Information Collection
Pak, Chan-ung;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.839-845,
7 Rare Malware Classification Using Memory Augmented Neural Networks
Kang, Min Chul;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.847-857,
8 Comparing Recoverability of Deleted Data According to Original Source Collection Methods on Microsoft SQL Server
Shin, Jiho; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.859-868,
9 A Study on Digital Evidence Collection System in Cyberspace
Jeong, Hyojeong;Choi, Jong-hyun;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.869-878,
10 Advanced Mobile Devices Biometric Authentication Model Based on Compliance
Jung, Yong-hun;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.879-888,
11 Study on Designation of Non-Critical Information Processing System for Financial Company Cloud Computing Activation
Chang, Myong-do;Kim, In-seok; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.889-903,
12 A Study on the Cyber Weapons Classification System
Lee, Yongseok;Kwon, Hunyeong;Choi, Jeongmin;Lim, Jongin; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.905-917,
13 Automated Method for Detecting OOB Vulnerability of Heap Memory Using Dynamic Symbolic Execution
Kang, Sangyong;Park, Sunghyun;Noh, Bongnam; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.919-928,
14 A Study on the Influence of Mobile Information Security on Mobile Office Service Satisfaction and Continuous Use in the Enterprise BYOD Environment
Park, Byoung-Woo;Jang, Seok-Eun;Lee, Eun-Kyoung;Lee, Sang-Joon; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.929-939,
15 A Study on Optimal Information Security Organizational Form in Financial Companies - Based on the Relationship between Management -
Kim, Sang-ho;Kim, In-Seok; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.941-950,
16 A Study on Improvement of Information Security awareness through Game: Focusing on Changes in Awareness of Information Security Policies
Choi, Jong-hyun; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.951-962,
17 Dynamic Analysis Framework for Cryptojacking Site Detection
Ko, DongHyun;Jung, InHyuk;Choi, Seok-Hwan;Choi, Yoon-Ho; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.963-974,
18 A Blockchain-Based Content Authentication Scheme for CCN
Kim, DaeYoub; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.975-985,
19 HyperCerts : Privacy-Enhanced OTP-Based Educational Certificate Blockchian System
Jung, Seung Wook; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.987-997,
20 Private Blockchain and Smart Contract Based High Trustiness Crowdsensing Incentive Mechanism
Yun, Jun-hyeok;Kim, Mi-hui; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.999-1007,
21 A Study on the Robustness of the Bitcoin Lightning Network
Lee, Seung-jin;Kim, Hyoung-shick; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.1009-1019,
22 Improving Customer Information Management System by Using Blockchain and Biometric Authentication
Na, YunSeok;Cho, Sangrae;Kim, Soo-hyung; / Korea Institute of Information Security and Cryptology , v.28, no.4, pp.1021-1030,