|
1 |
Compact Implementation and Analysis of Rainbow on 8bits-Microcontroller Uunit
Hong, Eungi;Cho, Seong-Min;Kim, Aeyoung;Seo, Seung-Hyun;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.697-708,
|
|
2 |
Application and Analysis of Masking Method to Implement Secure Lightweight Block Cipher CHAM Against Side-Channel Attack Attacks
Kwon, Hongpil;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.709-718,
|
|
3 |
Unlocking Shared Bike System by Exploiting an Application Log
Cho, Junwan;Lee, Jeeun;Kim, Kwangjo;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.719-728,
|
|
4 |
A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks
Lee, Jong-kwan;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.729-738,
|
|
5 |
Study of Hardware AES Module Backdoor Detection through Formal Method
Park, Jae-Hyeon;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.739-751,
|
|
6 |
A Design of Group Signature Based Vehicle Payment Protocol to Ensure Vehicle Anonymity
Chung, Myung-woo;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.753-773,
|
|
7 |
A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique
Kim, Su-jeong;Ha, Ji-hee;Oh, Soo-hyun;Lee, Tae-jin;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.775-784,
|
|
8 |
Performance Evaluation of a Machine Learning Model Based on Data Feature Using Network Data Normalization Technique
Lee, Wooho;Noh, BongNam;Jeong, Kimoon;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.785-794,
|
|
9 |
Decision Tree Techniques with Feature Reduction for Network Anomaly Detection
Kang, Koohong;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.795-805,
|
|
10 |
Automated Applying Greybox Fuzzing to C/C++ Library Using Unit Test
Jang, Joon Un;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.807-819,
|
|
11 |
Study on Highly Reliable Drone System to Mitigate Denial of Service Attack in Terms of Scheduling
Kwak, Ji-Won;Kang, Soo-Young;Kim, Seung-Joo;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.821-834,
|
|
12 |
A Study of Verification Methods for File Carving Tools by Scenario-Based Image Creation
Kim, Haeni;Kim, Jaeuk;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.835-845,
|
|
13 |
A Study on Human Vulnerability Factors of Companies : Through Spam Mail Simulation Training Experiments
Lee, Jun-hee;Kwon, Hun-yeong;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.847-857,
|
|
14 |
Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment
Han, Jaehyeok;Yoon, Youngin;Hur, Gimin;Lee, Jaeyeon;Choi, Jeongin;Hong, SeokJun;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.859-866,
|
|
15 |
Development of Hardware In the Loop System for Cyber Security Training in Nuclear Power Plants
Song, Jae-gu;Lee, Jung-woon;Lee, Cheol-kwon;Lee, Chan-young;Shin, Jin-soo;Hwang, In-koo;Choi, Jong-gyun;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.867-875,
|
|
16 |
A Study on the Implementation of Technical Security Control for Critical Digital Asset of Nuclear Facilities
Choi, Yun-hyuk;Lee, Sang-jin;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.877-884,
|
|
17 |
Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing
Kim, Shi-in;Kim, In-suk;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.885-895,
|
|
18 |
Analysis of the Trends of Domestic/International IT Product Introduction Policy and Deduce Improvement Plan of Domestic Policy
Son, Hyo-hyun;Kim, Kwang-jun;Lee, Man-hee;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.897-906,
|
|
19 |
A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure
Kim, Geunhye;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.907-918,
|
|
20 |
Security Enhancements for Distributed Ledger Technology Systems Based on Open Source
Park, Keundug;Kim, Dae Kyung;Youm, Heung Youl;
/
Korea Institute of Information Security and Cryptology
, v.29, no.4, pp.919-943,
|
|