|
1 |
A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment
Choi, Jeong-hee;Lee, Sang-ho;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.261-273,
|
|
2 |
Fuzzing Method for Web-Assembly Module Safety Validation
Park, Sunghyun;Kang, Sangyong;Kim, Yeonsu;Noh, Bongnam;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.275-285,
|
|
3 |
Novel Vulnerability against Dummy Based Side-Channel Countermeasures - Case Study: XMEGA
Lee, JongHyeok;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.287-297,
|
|
4 |
Personal Information Management System with Blockchain Using zk-SNARK
Lee, Jeong-hyuk;Hwang, Jung Yeon;Oh, Hyun-ok;Kim, Ji-hye;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.299-308,
|
|
5 |
Analysis of Blockchain Software Vulnerability against OS Command Injection Attack
Kim, Byoungkuk;Hur, Junbeom;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.309-320,
|
|
6 |
A Study on Anomaly Detection Model using Worker Access Log in Manufacturing Terminal PC
Ahn, Jong-seong;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.321-330,
|
|
7 |
Cyber-Threat Detection of ICS Using Sysmon and ELK
Kim, Yongjun;Shon, Taeshik;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.331-346,
|
|
8 |
Multi-Modal Based Malware Similarity Estimation Method
Yoo, Jeong Do;Kim, Taekyu;Kim, In-sung;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.347-363,
|
|
9 |
Executable Code Sanitizer to Strengthen Security of uC/OS Operating System for PLC
Choi, Gwang-jun;You, Geun-ha;Cho, Seong-je;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.365-375,
|
|
10 |
Token-Based IoT Access Control Using Distributed Ledger
Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.377-391,
|
|
11 |
Unauthorized Software Blocking Techniques in Software Defined Network (SDN) Environments
Kang, Nam-Gil;Kwon, TaeWook;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.393-399,
|
|
12 |
Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry
Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.401-415,
|
|
13 |
Efficient Wi-Fi Security Protocol Using Dual Tokens
Lee, Byoungcheon;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.417-429,
|
|
14 |
Proposal of Process Hollowing Attack Detection Using Process Virtual Memory Data Similarity
Lim, Su Min;Im, Eul Gyu;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.431-438,
|
|
15 |
On Physical Security Threat Breakdown Structure for Data Center Physical Security Level Up
Bae, Chun-sock;Goh, Sung-cheol;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.439-449,
|
|
16 |
A Study on the Organizational Conflict and Job Withdrawal Intention of the Information Security Workers
Kim, Geunhye;Park, Kyudong;Shim, Mina;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.451-463,
|
|
17 |
Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE(Measure of Cyber Effectiveness)
Park, JinHo;Kim, DuHoe;Shin, DongIl;Shin, DongKyoo;
/
Korea Institute of Information Security and Cryptology
, v.29, no.2, pp.465-472,
|
|