Digital Library


Search: "[ author: 이창훈 ]" (22)
    A Study on the Improvement of Domestic Policies and Guidelines for Secure AI Services
    , , , , Vol. 33, No. 6, pp. 975-987, Dec. 2023
    JKIISC.2023.33.6.975

    A Study on the Digital Forensics Artifacts Collection and Analysis of Browser Extension-Based Crypto Wallet
    , , , , , Vol. 33, No. 3, pp. 471-485, Jun. 2023
    10.13089/JKIISC.2023.33.3.471

    A Study on Creating WBC-AES Dummy LUT as a Countermeasure against DCA
    , , , , Vol. 33, No. 3, pp. 363-374, Jun. 2023
    10.13089/JKIISC.2023.33.3.363

    , , , , , Vol. 32, No. 6, pp. 1113-1120, Dec. 2022
    10.13089/JKIISC.2022.32.6.1093

    , , Vol. 31, No. 6, pp. 1205-1214, Dec. 2021
    10.13089/JKIISC.2021.31.6.1205

    Access Control Mechanism for Industrial Control System Based Smart Contract
    조민정, 이창훈, Vol. 29, No. 3, pp. 579-588, May. 2019
    10.13089/JKIISC.2019.29.3.579
    Keywords: Blockchain, Smart Contract, industrial control system(ICS), access control, Availability, Blockchain, Smart Contract, industrial control system(ICS), access control, Availability

    Instagram Users Behavior Analysis in a Digital Forensic Perspective
    Seunghee Seo, Yeog Kim, Changhoon Lee, Vol. 28, No. 2, pp. 407-416, Apr. 2018
    10.13089/JKIISC.2018.28.2.407
    Keywords: digital forensic, Instagram, SNS, Android, Android reverse engineering, digital forensic, Instagram, SNS, Android, Android reverse engineering

    Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System
    Gi-hoon Nam, Seong-hyeon Gong, Byoung-jin Seok, Changhoon Lee, Vol. 28, No. 1, pp. 111-122, Feb. 2018
    10.13089/JKIISC.2018.28.1.111
    Keywords: Credential, Data Acquisition, Digital Forensics, Login Bypass, OAuth Protocol, Credential, Data Acquisition, Digital Forensics, Login Bypass, OAuth Protocol

    Improving the Efficiency of the EWF-file Imaging Time from a Cryptographic Perspective
    Yonghak Shin, Dowon Kim, Changhoon Lee, Jongsung Kim, Vol. 26, No. 4, pp. 911-920, Aug. 2016
    10.13089/JKIISC.2016.26.4.911
    Keywords: digital forensic, EnCase, EWF, Image, Hash Functions, SHA-1, MD5

    Safety Analysis of Various Padding Techniques on Padding Oracle Attack
    Kimoon Kim, Myungseo Park, Jongsung Kim, Changhoon Lee, Dukjae Moon, Seokhee Hong, Vol. 25, No. 2, pp. 271-278, Apr. 2015
    10.13089/JKIISC.2015.25.2.271
    Keywords: Padding Oracle Attack, CBC Mode, block cipher