Digital Library
Search: "[ keyword: ACE ]" (55)
방화벽 접근정책의 계층적 가시화 방법에 대한 연구
김태용,
권태웅,
이준,
이윤수,
송중석,
Vol. 30, No. 6, pp. 1087-1101,
12월.
2020
10.13089/JKIISC.2020.30.6.1087
주제어: firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly, firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly
주제어: firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly, firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly
참조 테이블 기반 스칼라 곱 알고리즘에 대한 충돌 특성을 이용한 향상된 수평상관분석
박동준,
이상엽,
조성민,
김희석,
홍석희,
Vol. 30, No. 2, pp. 179-187,
4월.
2020
10.13089/JKIISC.2020.30.2.179
주제어: Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis, Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis
주제어: Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis, Scalar Multiplication, Side Channel Attack, Single Trace Attack, Correlation Analysis, Collision Analysis
사이버 공격 대비 가동 물리장치에 대한 실시간 간접 상태감시시스템 설계 및 구현
장원구,
이경호,
Vol. 29, No. 6, pp. 1447-1461,
12월.
2019
10.13089/JKIISC.2019.29.6.1447
주제어: Combat Assessment, Cyber Battle Damage Assessment, Cyberspace, Cyber Attack, Combat Assessment, Cyber Battle Damage Assessment, Cyberspace, Cyber Attack
주제어: Combat Assessment, Cyber Battle Damage Assessment, Cyberspace, Cyber Attack, Combat Assessment, Cyber Battle Damage Assessment, Cyberspace, Cyber Attack
사회공학 사이버작전 분석모델 정립연구
신규용,
김지원,
임현명,
김용주,
유진철,
Vol. 28, No. 6, pp. 1595-1606,
12월.
2018
10.13089/JKIISC.2018.28.6.1595
주제어: Social Engineering, Cyberspace Operations, Analysis Model, Social Engineering, Cyberspace Operations, Analysis Model
주제어: Social Engineering, Cyberspace Operations, Analysis Model, Social Engineering, Cyberspace Operations, Analysis Model
NTRUEncrypt에 대한 단일 파형 기반 전력 분석
안수정,
김수리,
진성현,
김한빛,
김희석,
홍석희,
Vol. 28, No. 5, pp. 1089-1098,
10월.
2018
10.13089/JKIISC.2018.28.5.1089
주제어: Side channel analysis, Single Trace Analysis, Post Quantum Cryptography, NTRUEncrypt, Side channel analysis, Single Trace Analysis, Post Quantum Cryptography, NTRUEncrypt
주제어: Side channel analysis, Single Trace Analysis, Post Quantum Cryptography, NTRUEncrypt, Side channel analysis, Single Trace Analysis, Post Quantum Cryptography, NTRUEncrypt
부채널 분석에 안전한 하드웨어 이진 스칼라 곱셈 알고리즘에 대한 단일 파형 비밀 키 비트 종속 공격
심보연,
강준기,
한동국,
Vol. 28, No. 5, pp. 1079-1087,
10월.
2018
10.13089/JKIISC.2018.28.5.1079
주제어: Side-Channel Analysis, Elliptic Curve Cryptography, Single-Trace Attack, Key Bit-dependent Attack, Countermeasure, Side-Channel Analysis, Elliptic Curve Cryptography, Single-Trace Attack, Key Bit-dependent Attack, Countermeasure
주제어: Side-Channel Analysis, Elliptic Curve Cryptography, Single-Trace Attack, Key Bit-dependent Attack, Countermeasure, Side-Channel Analysis, Elliptic Curve Cryptography, Single-Trace Attack, Key Bit-dependent Attack, Countermeasure
미국 ATE 정책 기반의 신규 사이버보안 인력양성 정책 비교 프레임워크 연구
홍순좌,
Vol. 28, No. 1, pp. 249-267,
2월.
2018
10.13089/JKIISC.2018.28.1.249
주제어: ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training, ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training
주제어: ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training, ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training
멀티코어 환경에서 효율적인 엔트로피 원의 설계 기법
김성겸,
이승준,
강형철,
홍득조,
성재철,
홍석희,
Vol. 28, No. 1, pp. 61-71,
2월.
2018
10.13089/JKIISC.2018.28.1.61
주제어: cryptography, Entropy, Entropy source, SEI(Source of Entropy Input), DRBG, NRBG, nonce, IoT(Internet of Things), data race condition, cryptography, Entropy, Entropy source, SEI(Source of Entropy Input), DRBG, NRBG, nonce, IoT(Internet of Things), data race condition
주제어: cryptography, Entropy, Entropy source, SEI(Source of Entropy Input), DRBG, NRBG, nonce, IoT(Internet of Things), data race condition, cryptography, Entropy, Entropy source, SEI(Source of Entropy Input), DRBG, NRBG, nonce, IoT(Internet of Things), data race condition