Browse > Article List

논문
1 A Secure Authentication and Key Agreement Scheme for Smart Grid Environments without Tamper-Resistant Devices
Park, Ki-Sung;Yoon, Dae-Geun;Noh, SungKee; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.313-323,
2 On Resistance of Bit Permutation Based Block Cipher against Nonlinear Invariant Attack
Jeong, Keonsang;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.325-336,
3 An Study on the Analysis of Design Criteria for S-Box Based on Deep Learning
Kim, Dong-hoon;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.337-347,
4 Development and Security Analysis of GIFT-64-Variant That Can Be Efficiently Implemented by Bit-Slice Technique
Baek, Seungjun;Kim, Hangi;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.349-356,
5 Advanced Feature Selection Method on Android Malware Detection by Machine Learning
Boo, Joo-hun;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.357-367,
6 Analysis of Encryption and Decryption Processes of Realm Database and Its Application
Youn, Byungchul;Park, Myungseo;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.369-378,
7 Identity Verification in Financial Transactions Using a Stylus Pen
Kim, Hyun-Ji;Jang, Kyung-Bae;Kwon, Hyeok-Dong;Kim, Hyun-Jun;Seo, Hwa-Jeong; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.379-388,
8 Propagation Modeling of WannaCryptor Wormable Malware
Park, Tae Hwan;Lee, Howoong;Shin, Weon; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.389-396,
9 Study on MalangMalang Talkafe Database Encryption Process and Recovering Its Deleted Messages on Windows
Youn, Byungchul;Kim, Soram;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.397-403,
10 Study on Improved Decryption Method of WeChat Messenger and Deleted Message Recovery Using SQLite Full Text Search Data
Hur, Uk;Park, Myungseo;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.405-415,
11 A Study the Mobile Forensics Model for Improving Integrity
Kim, Young-june;Kim, Wan-ju;Lim, Jae-sung; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.417-428,
12 A Study of Office Open XML Document-Based Malicious Code Analysis and Detection Methods
Lee, Deokkyu;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.429-442,
13 Runtime-Guard Coverage Guided Fuzzer Avoiding Deoptimization for Optimized Javascript Functions
Kim, Hong-Kyo;Moon, Jong-sub; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.443-454,
14 Detection of NoSQL Injection Attack in Non-Relational Database Using Convolutional Neural Network and Recurrent Neural Network
Seo, Jeong-eun;Moon, Jong-sub; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.455-464,
15 A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses
Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.465-479,
16 Development of Rule-Based Malicious URL Detection Library Considering User Experiences
Kim, Bo-Min;Han, Ye-Won;Kim, Ga-Young;Kim, Ye-Bun;Kim, Hyung-Jong; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.481-491,
17 ICFGO : UI Concealing and Dummy Flow Insertion Method for Inter-Procedural Control Flow Graph Obfuscation
Shim, Hyunseok;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.493-501,
18 Suggestions for Applications of Anonymous Data under the Revised Data Privacy Acts
Chun, Ji Young;Noh, Geontae; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.503-512,
19 Proposal for a Custody and Federated Service Model for the Decentralized Identity
Yeo, Kiho;Park, Keundug;Youm, Heung Youl; / Korea Institute of Information Security and Cryptology , v.30, no.3, pp.513-525,