Browse > Article List

논문
1 Compact Implementation and Analysis of Rainbow on 8bits-Microcontroller Uunit
Hong, Eungi;Cho, Seong-Min;Kim, Aeyoung;Seo, Seung-Hyun; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.697-708,
2 Application and Analysis of Masking Method to Implement Secure Lightweight Block Cipher CHAM Against Side-Channel Attack Attacks
Kwon, Hongpil;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.709-718,
3 Unlocking Shared Bike System by Exploiting an Application Log
Cho, Junwan;Lee, Jeeun;Kim, Kwangjo; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.719-728,
4 A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks
Lee, Jong-kwan; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.729-738,
5 Study of Hardware AES Module Backdoor Detection through Formal Method
Park, Jae-Hyeon;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.739-751,
6 A Design of Group Signature Based Vehicle Payment Protocol to Ensure Vehicle Anonymity
Chung, Myung-woo;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.753-773,
7 A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique
Kim, Su-jeong;Ha, Ji-hee;Oh, Soo-hyun;Lee, Tae-jin; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.775-784,
8 Performance Evaluation of a Machine Learning Model Based on Data Feature Using Network Data Normalization Technique
Lee, Wooho;Noh, BongNam;Jeong, Kimoon; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.785-794,
9 Decision Tree Techniques with Feature Reduction for Network Anomaly Detection
Kang, Koohong; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.795-805,
10 Automated Applying Greybox Fuzzing to C/C++ Library Using Unit Test
Jang, Joon Un;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.807-819,
11 Study on Highly Reliable Drone System to Mitigate Denial of Service Attack in Terms of Scheduling
Kwak, Ji-Won;Kang, Soo-Young;Kim, Seung-Joo; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.821-834,
12 A Study of Verification Methods for File Carving Tools by Scenario-Based Image Creation
Kim, Haeni;Kim, Jaeuk;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.835-845,
13 A Study on Human Vulnerability Factors of Companies : Through Spam Mail Simulation Training Experiments
Lee, Jun-hee;Kwon, Hun-yeong; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.847-857,
14 Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment
Han, Jaehyeok;Yoon, Youngin;Hur, Gimin;Lee, Jaeyeon;Choi, Jeongin;Hong, SeokJun;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.859-866,
15 Development of Hardware In the Loop System for Cyber Security Training in Nuclear Power Plants
Song, Jae-gu;Lee, Jung-woon;Lee, Cheol-kwon;Lee, Chan-young;Shin, Jin-soo;Hwang, In-koo;Choi, Jong-gyun; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.867-875,
16 A Study on the Implementation of Technical Security Control for Critical Digital Asset of Nuclear Facilities
Choi, Yun-hyuk;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.877-884,
17 Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing
Kim, Shi-in;Kim, In-suk; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.885-895,
18 Analysis of the Trends of Domestic/International IT Product Introduction Policy and Deduce Improvement Plan of Domestic Policy
Son, Hyo-hyun;Kim, Kwang-jun;Lee, Man-hee; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.897-906,
19 A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure
Kim, Geunhye; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.907-918,
20 Security Enhancements for Distributed Ledger Technology Systems Based on Open Source
Park, Keundug;Kim, Dae Kyung;Youm, Heung Youl; / Korea Institute of Information Security and Cryptology , v.29, no.4, pp.919-943,