Digital Library
Search: "[ author: 이창훈 ]" (22)
Access Control Mechanism for Industrial Control System Based Smart Contract
조민정,
이창훈,
Vol. 29, No. 3, pp. 579-588,
May.
2019
10.13089/JKIISC.2019.29.3.579
Keywords: Blockchain, Smart Contract, industrial control system(ICS), access control, Availability, Blockchain, Smart Contract, industrial control system(ICS), access control, Availability
10.13089/JKIISC.2019.29.3.579
Keywords: Blockchain, Smart Contract, industrial control system(ICS), access control, Availability, Blockchain, Smart Contract, industrial control system(ICS), access control, Availability
Instagram Users Behavior Analysis in a Digital Forensic Perspective
Seunghee Seo,
Yeog Kim,
Changhoon Lee,
Vol. 28, No. 2, pp. 407-416,
Apr.
2018
10.13089/JKIISC.2018.28.2.407
Keywords: digital forensic, Instagram, SNS, Android, Android reverse engineering, digital forensic, Instagram, SNS, Android, Android reverse engineering
10.13089/JKIISC.2018.28.2.407
Keywords: digital forensic, Instagram, SNS, Android, Android reverse engineering, digital forensic, Instagram, SNS, Android, Android reverse engineering
Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System
Gi-hoon Nam,
Seong-hyeon Gong,
Byoung-jin Seok,
Changhoon Lee,
Vol. 28, No. 1, pp. 111-122,
Feb.
2018
10.13089/JKIISC.2018.28.1.111
Keywords: Credential, Data Acquisition, Digital Forensics, Login Bypass, OAuth Protocol, Credential, Data Acquisition, Digital Forensics, Login Bypass, OAuth Protocol
10.13089/JKIISC.2018.28.1.111
Keywords: Credential, Data Acquisition, Digital Forensics, Login Bypass, OAuth Protocol, Credential, Data Acquisition, Digital Forensics, Login Bypass, OAuth Protocol
Improving the Efficiency of the EWF-file Imaging Time from a Cryptographic Perspective
Yonghak Shin,
Dowon Kim,
Changhoon Lee,
Jongsung Kim,
Vol. 26, No. 4, pp. 911-920,
Aug.
2016
10.13089/JKIISC.2016.26.4.911
Keywords: digital forensic, EnCase, EWF, Image, Hash Functions, SHA-1, MD5
10.13089/JKIISC.2016.26.4.911
Keywords: digital forensic, EnCase, EWF, Image, Hash Functions, SHA-1, MD5
Safety Analysis of Various Padding Techniques on Padding Oracle Attack
Kimoon Kim,
Myungseo Park,
Jongsung Kim,
Changhoon Lee,
Dukjae Moon,
Seokhee Hong,
Vol. 25, No. 2, pp. 271-278,
Apr.
2015
10.13089/JKIISC.2015.25.2.271
Keywords: Padding Oracle Attack, CBC Mode, block cipher
10.13089/JKIISC.2015.25.2.271
Keywords: Padding Oracle Attack, CBC Mode, block cipher