Browse > Article List

논문
1 A Survey on Unsupervised Anomaly Detection for Multivariate Time Series
Juwan Lim;Jaekoo Lee; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.1-12,
2 Analysis of the Cryptosystem of the Korean Government Public-Key Infrastructure and Ways to Improve It
Younghoon Jung;Dongyoung Roh;Bonwook Koo; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.13-31,
3 A Study on Performance Improvement of Non-Profiling Based Power Analysis Attack against CRYSTALS-Dilithium
Sechang Jang;Minjong Lee;Hyoju Kang;Jaecheol Ha; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.33-43,
4 A Steganography-Based Covert Communication Method in Roblox Metaverse Environment
Dokyung Yun;Youngho Cho; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.45-50,
5 Study on The Data Decryption and Artifacts Analysis of KakaoTalk in Windows Environment
Minuook Jo;Nam Su Chang; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.51-61,
6 Invasion of Pivacy of Federated Learning by Data Reconstruction Attack with Technique for Converting Pixel Value
Yoon-ju Oh;Dae-seon Choi; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.63-74,
7 Enhancing Security of Transaction Session in Financial Open API Environment Using Hybrid Session Protection Protocol Combined with NTRU
Sujin Kwon;Deoksang Kim;Yeongjae Park;Jieun Ryu;Ju-Sung Kang;Yongjin Yeom; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.75-86,
8 Analysis of the Impact of Host Resource Exhaustion Attacks in a Container Environment
Jun-hee Lee;Jae-hyun Nam;Jin-woo Kim; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.87-97,
9 Improvement Plan to Expand the Role of Expert Data Combination Agency
GiBum Kim;Hun-Yeong Kwon; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.99-116,
10 A Study on Preferences and Utilities of Digital Signature Certificate Choice Factors Using Conjoint Analysis
Whanchul Kang; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.117-128,
11 A Study on Implementing an Automated Tool for De-Obfuscating a ConfuserEx
Jae-hwi Lee;Young-seok Park;Dong-hyeon Kim;Gyu Heo; / Korea Institute of Information Security and Cryptology , v.33, no.1, pp.129-137,