Browse > Article List

논문
1 How to Generate Lightweight S-Boxes by Using AND Gate Accumulation
Jeon, Yongjin;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.465-475,
2 Preventing Mobile Game Client Memory Manipulation Based on Event Sourcing Patterns and Blockchain
Park, Jihun;Park, Young-Ho; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.477-486,
3 TPMP: A Privacy-Preserving Technique for DNN Prediction Using ARM TrustZone
Song, Suhyeon;Park, Seonghwan;Kwon, Donghyun; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.487-499,
4 Deobfuscation Processing and Deep Learning-Based Detection Method for PowerShell-Based Malware
Jung, Ho-jin;Ryu, Hyo-gon;Jo, Kyu-whan;Lee, Sangkyun; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.501-511,
5 Redactable Blockchain Based Authority Alteration and Accessn Control System
Lee, Yeon Joo;Choi, Jae Hyun;Noh, Geontae;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.513-525,
6 Implementation of an APT Attack Detection System through ATT&CK-Based Attack Chain Reconstruction
Cho, Sungyoung;Park, Yongwoo;Lee, Kyeongsik; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.527-545,
7 P2P Based Telemedicine System Using Thermographic Camera
Kim, Kyoung Min;Ryu, Jae Hyun;Hong, Sung Jun;Kim, Hongjun; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.547-554,
8 Machine Learning-Based Malicious URL Detection Technique
Han, Chae-rim;Yun, Su-hyun;Han, Myeong-jin;Lee, Il-Gu; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.555-564,
9 An Analysis of Security Vulnerabilities Using 5G NAS COUNT
Kim, Min-Jae;Park, Jong-Geun;Shin, Ji-Soo;Moon, Dae-Sung; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.565-573,
10 A Study on the Effects of IS Organization Justice and Positive Psychological Capital on Mitigation of Role Stress
Hwang, Inho;Lee, Yunsock; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.575-590,
11 A Study of Security Evaluation Criteria for Reconnaissance Drone
Gu, Do-hyung;Kim, Seung-joo;Lee, Sang-jin; / Korea Institute of Information Security and Cryptology , v.32, no.3, pp.591-605,