Digital Library


Search: "[ author: 이용 ]" (16)
    High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology
    황찬웅, 김진강, 이용수, 김형래, 이태진, Vol. 30, No. 6, pp. 1067-1078, Dec. 2020
    10.13089/JKIISC.2020.30.6.1067
    Keywords: Copyright Protection Technology, Pirated contents search, heavy uploader profiling, Copyright Protection Technology, Pirated contents search, heavy uploader profiling

    Detection of Disguised Packet and Valid Reconstruction Identification Using Network Coding in IoT Environment
    Yong Lee, Vol. 30, No. 1, pp. 29-37, Feb. 2020
    10.13089/JKIISC.2020.30.1.29
    Keywords: Network coding, IoT, Disguised Packet, Valid Reconstruction, Network coding, IoT, Disguised Packet, Valid Reconstruction

    A Study on the Cyber Weapons Classification System
    이용석, 권헌영, 최정민, 임종인, Vol. 28, No. 4, pp. 905-917, Jul. 2018
    10.13089/JKIISC.2018.28.4.905
    Keywords: Cyber weapons, Cyber weapons classification, Kind of Cyber weapons, Cyber weapons, Cyber weapons classification, Kind of Cyber weapons

    Information Security Investment Model and Level in Incomplete Information
    Yong-pil Lee, Vol. 27, No. 4, pp. 855-862, Aug. 2017
    10.13089/JKIISC.2017.27.4.855
    Keywords: Information Security Investment, Incomplete Information

    Security Analysis on GFN with Secret S-box
    Yongseong Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong, Vol. 27, No. 3, pp. 467-476, Jun. 2017
    10.13089/JKIISC.2017.27.3.467
    Keywords: Secret S-box, Integral cryptanalysis, Structural cryptanalysis, Generalized feistel networks

    Efficient Optimization Method for Polynomial Selection
    Suhri Kim, Heetaek Kwon, Yongseong Lee, Nam Su Chang, Kisoon Yoon, Chang Han Kim, Young-Ho Park, Seokhie Hong, Vol. 26, No. 3, pp. 631-644, Jun. 2016
    10.13089/JKIISC.2016.26.3.631
    Keywords: GNFS, Polynomial Selection, Root optimization

    A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions
    Yeon-ho Jo, Yong-pil Lee, Jong-in Lim, Kyoung-ho Lee, Vol. 25, No. 4, pp. 905-914, Aug. 2015
    10.13089/JKIISC.2015.25.4.905
    Keywords: Cost of Information Security, Cost Estimate of Information Security Solutions, Security Sustainable Service

    E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions
    Jong-Uk Choi, Yong-Jin Lee, Ju-Mi Park, Vol. 22, No. 5, pp. 1103-1114, Oct. 2012
    10.13089/JKIISC.2012.22.5.1103
    Keywords: PPS, DLP, E-DRM, Contents Filtering, APT, Privacy

    e-Passport Security Technology using Biometric Information Watermarking
    Yong-Joon Lee, Vol. 21, No. 4, pp. 115-124, Aug. 2011
    10.13089/JKIISC.2011.21.4.115
    Keywords: e-Passport, biometrics, Digital watermarking

    Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility
    Lee Goo-Yeon, Lee Yong, Kim Hwa-Jong, Jeong Choong-Kyo, Lee Dong-Eun, Vol. 15, No. 4, pp. 61-70, Aug. 2005
    10.13089/JKIISC.2005.15.4.61
    Keywords: P2P security, data sharing, file sharing one-time password, symmetry key, Public Key