|
1 |
A Secure Authentication and Key Agreement Scheme for Smart Grid Environments without Tamper-Resistant Devices
Park, Ki-Sung;Yoon, Dae-Geun;Noh, SungKee;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.313-323,
|
|
2 |
On Resistance of Bit Permutation Based Block Cipher against Nonlinear Invariant Attack
Jeong, Keonsang;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.325-336,
|
|
3 |
An Study on the Analysis of Design Criteria for S-Box Based on Deep Learning
Kim, Dong-hoon;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.337-347,
|
|
4 |
Development and Security Analysis of GIFT-64-Variant That Can Be Efficiently Implemented by Bit-Slice Technique
Baek, Seungjun;Kim, Hangi;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.349-356,
|
|
5 |
Advanced Feature Selection Method on Android Malware Detection by Machine Learning
Boo, Joo-hun;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.357-367,
|
|
6 |
Analysis of Encryption and Decryption Processes of Realm Database and Its Application
Youn, Byungchul;Park, Myungseo;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.369-378,
|
|
7 |
Identity Verification in Financial Transactions Using a Stylus Pen
Kim, Hyun-Ji;Jang, Kyung-Bae;Kwon, Hyeok-Dong;Kim, Hyun-Jun;Seo, Hwa-Jeong;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.379-388,
|
|
8 |
Propagation Modeling of WannaCryptor Wormable Malware
Park, Tae Hwan;Lee, Howoong;Shin, Weon;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.389-396,
|
|
9 |
Study on MalangMalang Talkafe Database Encryption Process and Recovering Its Deleted Messages on Windows
Youn, Byungchul;Kim, Soram;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.397-403,
|
|
10 |
Study on Improved Decryption Method of WeChat Messenger and Deleted Message Recovery Using SQLite Full Text Search Data
Hur, Uk;Park, Myungseo;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.405-415,
|
|
11 |
A Study the Mobile Forensics Model for Improving Integrity
Kim, Young-june;Kim, Wan-ju;Lim, Jae-sung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.417-428,
|
|
12 |
A Study of Office Open XML Document-Based Malicious Code Analysis and Detection Methods
Lee, Deokkyu;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.429-442,
|
|
13 |
Runtime-Guard Coverage Guided Fuzzer Avoiding Deoptimization for Optimized Javascript Functions
Kim, Hong-Kyo;Moon, Jong-sub;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.443-454,
|
|
14 |
Detection of NoSQL Injection Attack in Non-Relational Database Using Convolutional Neural Network and Recurrent Neural Network
Seo, Jeong-eun;Moon, Jong-sub;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.455-464,
|
|
15 |
A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses
Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.465-479,
|
|
16 |
Development of Rule-Based Malicious URL Detection Library Considering User Experiences
Kim, Bo-Min;Han, Ye-Won;Kim, Ga-Young;Kim, Ye-Bun;Kim, Hyung-Jong;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.481-491,
|
|
17 |
ICFGO : UI Concealing and Dummy Flow Insertion Method for Inter-Procedural Control Flow Graph Obfuscation
Shim, Hyunseok;Jung, Souhwan;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.493-501,
|
|
18 |
Suggestions for Applications of Anonymous Data under the Revised Data Privacy Acts
Chun, Ji Young;Noh, Geontae;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.503-512,
|
|
19 |
Proposal for a Custody and Federated Service Model for the Decentralized Identity
Yeo, Kiho;Park, Keundug;Youm, Heung Youl;
/
Korea Institute of Information Security and Cryptology
, v.30, no.3, pp.513-525,
|
|