Digital Library
Search: "[ author: 이주영 ]" (4)
A Preimage Attack on the MJH Hash Function
Jooyoung Lee,
Jongsung Kim,
Vol. 26, No. 2, pp. 315-318,
Apr.
2016
10.13089/JKIISC.2016.26.2.315
Keywords: Hash Function, Preimage Attack, Block ciphers
10.13089/JKIISC.2016.26.2.315
Keywords: Hash Function, Preimage Attack, Block ciphers
Effective Risk Level Assessment Using Three-Dimensional Vector Visualization
Ju-young Lee,
In-hyun Cho,
Jae-hee Lee,
Kyung-ho Lee,
Vol. 25, No. 6, pp. 1595-1606,
Dec.
2015
10.13089/JKIISC.2015.25.6.1595
Keywords: Risk Analysis, Information Security Decision Making, 3-dimensional Visualization
10.13089/JKIISC.2015.25.6.1595
Keywords: Risk Analysis, Information Security Decision Making, 3-dimensional Visualization
A Study on Hard Disk Drive ATA Passwords
Ju-young Lee,
Sang-jin Lee,
Vol. 25, No. 5, pp. 1059-1066,
Oct.
2015
10.13089/JKIISC.2015.25.5.1059
Keywords: ATA Password, Unlock Hard Disk Drive, System Area, Anti-anti Forensics
10.13089/JKIISC.2015.25.5.1059
Keywords: ATA Password, Unlock Hard Disk Drive, System Area, Anti-anti Forensics
Improved cryptanalysis of lightweight RFID mutual authentication Protocols LMAP, $M^2AP$ , EMAP
Dae-Sung Kwon,
Joo-Young Lee,
Bon-Wook Koo,
Vol. 17, No. 4, pp. 103-114,
Aug.
2007
10.13089/JKIISC.2007.17.4.103
Keywords: 상호인증 프로토콜, 위장 공격, 태그 추적, RFID
10.13089/JKIISC.2007.17.4.103
Keywords: 상호인증 프로토콜, 위장 공격, 태그 추적, RFID
Category Search
Publications
-
Vol. 34, 2024
-
Vol. 33, 2023
-
Vol. 32, 2022
-
Vol. 31, 2021
-
Vol. 30, 2020
-
Vol. 29, 2019
-
Vol. 28, 2018
-
Vol. 27, 2017
-
Vol. 26, 2016
-
Vol. 25, 2015
-
Vol. 24, 2014
-
Vol. 23, 2013
-
Vol. 22, 2012
-
Vol. 21, 2011
-
Vol. 20, 2010
-
Vol. 19, 2009
-
Vol. 18, 2008
-
Vol. 17, 2007
-
Vol. 16, 2006
-
Vol. 15, 2005
-
Vol. 14, 2004
-
Vol. 13, 2003
-
Vol. 12, 2002
-
Vol. 11, 2001
-
Vol. 10, 2000
-
Vol. 9, 1999
-
Vol. 8, 1998
-
Vol. 7, 1997
-
Vol. 6, 1996
-
Vol. 5, 1995
-
Vol. 4, 1994
-
Vol. 2, 1992
-
Vol. 1, 1991