Browse > Article List

논문
1 S.O.S : Shield of Steam Protection Based on API Call Birthmark in Online Game ESD DRM
Oh, Dong Bin;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1297-1307,
2 A Study of End-to-End Message Security Protocol Based on Lightweight Ciphers for Smart IoT Devices
Kim, Hee-jeong;Kim, Jeong Nyeo; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1309-1317,
3 Automated Classification of Unknown Smart Contracts of Ethereum Using Machine Learning
Lee, Donggun;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1319-1328,
4 Efficient Multi-Bit Encryption Scheme Using LWE and LWR
Jang, Cho Rong;Seo, Minhye;Park, Jong Hwan; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1329-1342,
5 Stateless Randomized Token Authentication for Performance Improvement of OAuth 2.0 MAC Token Authentication
Lee, Byoungcheon; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1343-1354,
6 Trustworthy Smart Band: Security Requirements Analysis with Threat Modeling
Kang, Suin;Kim, Hye Min;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1355-1369,
7 Utilization and Optimized Implementation of Format Preserving Encryption Algorithm for IoT and BLE Communications
Lim, Ji-hwan;Kwon, Hyuk-dong;Woo, Jae-min;An, Kyu-hwang;Kim, Do-young;Seo, Hwa-jeong; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1371-1378,
8 Improved Differential-Linear Cryptanalysis Using DLCT
Kim, Hyunwoo;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1379-1392,
9 Automatic Patch Information Collection System Using Web Crawler
Kim, Yonggun;Na, Sarang;Kim, Hwankuk;Won, Yoojae; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1393-1399,
10 Privacy-Preserving k-means Clustering of Encrypted Data
Jeong, Yunsong;Kim, Joon Sik;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1401-1414,
11 Hansel and Gretel : GFG Detection Scheme Based on In-Game Item Transactions
Lee, Gyung Min;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1415-1425,
12 Cryptographic Key Generation Method Using Biometrics and Multiple Classification Model
Lee, Hyeonseok;Kim, Hyejin;Nyang, DaeHun;Lee, KyungHee; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1427-1437,
13 Study on History Tracking Technique of the Document File through RSID Analysis in MS Word
Joun, Jihun;Han, Jaehyeok;Jung, Doowon;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1439-1448,
14 Risk Scoring System for Software Vulnerability Using Public Vulnerability Information
Kim, Min Cheol;Oh, Sejoon;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1449-1461,
15 A Method for Field Based Grey Box Fuzzing with Variational Autoencoder
Lee, Su-rim;Moon, Jong-sub; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1463-1474,
16 Proposal for 2-WAY Trade Verification Model that Based on Consensus between Trading Partners
Lee, Ig-jun;Oh, Jae-sub;Youm, Heung-youl; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1475-1487,
17 A Validation of Effectiveness for Intrusion Detection Events Using TF-IDF
Kim, Hyoseok;Kim, Yong-Min; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1489-1497,
18 Black Consumer Detection in E-Commerce Using Filter Method and Classification Algorithms
Lee, Taekyu;Lee, Kyung Ho; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1499-1508,
19 POSCAL : A Protocol of Service Access Control by Authentication Level
Yoo, SeongMin;Choi, SeokJin;Park, JunHoo;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1509-1522,
20 Study on the AI Speaker Security Evaluations and Countermeasure
Lee, Ji-seop;Kang, Soo-young;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1523-1537,
21 A Study on Vulnerability Assessment for the Digital Assets in NPP Based on Analytical Methods
Kim, In-kyung;Kwon, Kook-heui; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1539-1552,
22 A Method Verifying Execution Environment Integrity for Secure Execution of Packed Android Application
Ha, Dongsoo;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1553-1561,
23 The Role and Collaboration Model of Human and Artificial Intelligence Considering Human Factor in Financial Security
Lee, Bo-Ra;Kim, In-Seok; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1563-1583,
24 A Study on the Method of Checking the Level of Information Security Management Using Security Maturity Model
Lee, Sang-kyu;Kim, In-seok; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1585-1594,
25 Building an Analysis Model for Social Engineering Based Cyberspace Operations
Shin, Kyuyong;Kim, Jeewon;Lim, Hyun-myung;Kim, Yongju;Yoo, Jincheol; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1595-1606,
26 A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information
Choi, Yong-hyuk;Kwon, Hun-yeong; / Korea Institute of Information Security and Cryptology , v.28, no.6, pp.1607-1621,