Digital Library
Search: "[ author: 이용 ]" (16)
High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology
황찬웅,
김진강,
이용수,
김형래,
이태진,
Vol. 30, No. 6, pp. 1067-1078,
Dec.
2020
10.13089/JKIISC.2020.30.6.1067
Keywords: Copyright Protection Technology, Pirated contents search, heavy uploader profiling, Copyright Protection Technology, Pirated contents search, heavy uploader profiling
10.13089/JKIISC.2020.30.6.1067
Keywords: Copyright Protection Technology, Pirated contents search, heavy uploader profiling, Copyright Protection Technology, Pirated contents search, heavy uploader profiling
Detection of Disguised Packet and Valid Reconstruction Identification Using Network Coding in IoT Environment
Yong Lee,
Vol. 30, No. 1, pp. 29-37,
Feb.
2020
10.13089/JKIISC.2020.30.1.29
Keywords: Network coding, IoT, Disguised Packet, Valid Reconstruction, Network coding, IoT, Disguised Packet, Valid Reconstruction
10.13089/JKIISC.2020.30.1.29
Keywords: Network coding, IoT, Disguised Packet, Valid Reconstruction, Network coding, IoT, Disguised Packet, Valid Reconstruction
A Study on the Cyber Weapons Classification System
이용석,
권헌영,
최정민,
임종인,
Vol. 28, No. 4, pp. 905-917,
Jul.
2018
10.13089/JKIISC.2018.28.4.905
Keywords: Cyber weapons, Cyber weapons classification, Kind of Cyber weapons, Cyber weapons, Cyber weapons classification, Kind of Cyber weapons
10.13089/JKIISC.2018.28.4.905
Keywords: Cyber weapons, Cyber weapons classification, Kind of Cyber weapons, Cyber weapons, Cyber weapons classification, Kind of Cyber weapons
Information Security Investment Model and Level in Incomplete Information
Yong-pil Lee,
Vol. 27, No. 4, pp. 855-862,
Aug.
2017
10.13089/JKIISC.2017.27.4.855
Keywords: Information Security Investment, Incomplete Information
10.13089/JKIISC.2017.27.4.855
Keywords: Information Security Investment, Incomplete Information
Security Analysis on GFN with Secret S-box
Yongseong Lee,
HyungChul Kang,
Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Vol. 27, No. 3, pp. 467-476,
Jun.
2017
10.13089/JKIISC.2017.27.3.467
Keywords: Secret S-box, Integral cryptanalysis, Structural cryptanalysis, Generalized feistel networks
10.13089/JKIISC.2017.27.3.467
Keywords: Secret S-box, Integral cryptanalysis, Structural cryptanalysis, Generalized feistel networks
Efficient Optimization Method for Polynomial Selection
Suhri Kim,
Heetaek Kwon,
Yongseong Lee,
Nam Su Chang,
Kisoon Yoon,
Chang Han Kim,
Young-Ho Park,
Seokhie Hong,
Vol. 26, No. 3, pp. 631-644,
Jun.
2016
10.13089/JKIISC.2016.26.3.631
Keywords: GNFS, Polynomial Selection, Root optimization
10.13089/JKIISC.2016.26.3.631
Keywords: GNFS, Polynomial Selection, Root optimization
A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions
Yeon-ho Jo,
Yong-pil Lee,
Jong-in Lim,
Kyoung-ho Lee,
Vol. 25, No. 4, pp. 905-914,
Aug.
2015
10.13089/JKIISC.2015.25.4.905
Keywords: Cost of Information Security, Cost Estimate of Information Security Solutions, Security Sustainable Service
10.13089/JKIISC.2015.25.4.905
Keywords: Cost of Information Security, Cost Estimate of Information Security Solutions, Security Sustainable Service
E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions
Jong-Uk Choi,
Yong-Jin Lee,
Ju-Mi Park,
Vol. 22, No. 5, pp. 1103-1114,
Oct.
2012
10.13089/JKIISC.2012.22.5.1103
Keywords: PPS, DLP, E-DRM, Contents Filtering, APT, Privacy
10.13089/JKIISC.2012.22.5.1103
Keywords: PPS, DLP, E-DRM, Contents Filtering, APT, Privacy
e-Passport Security Technology using Biometric Information Watermarking
Yong-Joon Lee,
Vol. 21, No. 4, pp. 115-124,
Aug.
2011
10.13089/JKIISC.2011.21.4.115
Keywords: e-Passport, biometrics, Digital watermarking
10.13089/JKIISC.2011.21.4.115
Keywords: e-Passport, biometrics, Digital watermarking
Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility
Lee Goo-Yeon,
Lee Yong,
Kim Hwa-Jong,
Jeong Choong-Kyo,
Lee Dong-Eun,
Vol. 15, No. 4, pp. 61-70,
Aug.
2005
10.13089/JKIISC.2005.15.4.61
Keywords: P2P security, data sharing, file sharing one-time password, symmetry key, Public Key
10.13089/JKIISC.2005.15.4.61
Keywords: P2P security, data sharing, file sharing one-time password, symmetry key, Public Key