Digital Library
Search: "[ keyword: CA ]" (792)
VANET 환경을 위한 계층적 구조의 익명 인증 기술
배경진,
이영경,
김종현,
이동훈,
Vol. 28, No. 3, pp. 563-577,
6월.
2018
10.13089/JKIISC.2018.28.3.563
주제어: VANET, authentication, Conditional Privacy, IBS, pairing-free, VANET, authentication, Conditional Privacy, IBS, pairing-free
주제어: VANET, authentication, Conditional Privacy, IBS, pairing-free, VANET, authentication, Conditional Privacy, IBS, pairing-free
스마트폰 전자금융서비스에서의 인증 과정에 관한 연구(앱카드를 중심으로)
김한우,
이근영,
임종인,
권헌영,
Vol. 28, No. 3, pp. 579-590,
6월.
2018
10.13089/JKIISC.2018.28.3.579
주제어: authentication, appcard, identity proofing, electronic financial services, authentication, appcard, identity proofing, electronic financial services
주제어: authentication, appcard, identity proofing, electronic financial services, authentication, appcard, identity proofing, electronic financial services
소스 코드 난독화 기법에 의한 Clang 정적 분석 도구의 성능 영향 분석
진홍주,
박문찬,
이동훈,
Vol. 28, No. 3, pp. 605-615,
6월.
2018
10.13089/JKIISC.2018.28.3.605
주제어: Internet of Things, software weakness, Static Analysis, Source Code Obfuscation, Internet of Things, software weakness, Static Analysis, Source Code Obfuscation
주제어: Internet of Things, software weakness, Static Analysis, Source Code Obfuscation, Internet of Things, software weakness, Static Analysis, Source Code Obfuscation
NTRU 서명 시스템 구현에 대한 오류 주입 공격 및 대응 방안 연구
장호철,
오수현,
하재철,
Vol. 28, No. 3, pp. 551-561,
6월.
2018
10.13089/JKIISC.2018.28.3.551
주제어: Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure, Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure
주제어: Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure, Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure
차세대 보안리더 양성프로그램의 성과평가 지표 개발
박성규,
김태성,
김진석,
유성재,
Vol. 28, No. 2, pp. 501-511,
4월.
2018
10.13089/JKIISC.2018.28.2.501
주제어: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
주제어: Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP, Information Security Training, Performance Indicator, Workforce Development, Logic Model, AHP
VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법
김광준,
황규호,
김인경,
오형근,
이만희,
Vol. 28, No. 2, pp. 449-456,
4월.
2018
10.13089/JKIISC.2018.28.2.449
주제어: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
주제어: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
거리기반 키스트로크 다이나믹스 스마트폰 인증과 임계값 공식 모델
이신철,
황정연,
이현구,
김동인,
이성훈,
신지선,
Vol. 28, No. 2, pp. 369-383,
4월.
2018
10.13089/JKIISC.2018.28.2.369
주제어: Keystroke Dynamics, Distance-based classifications, Smartphone authentication, Keystroke Dynamics, Distance-based classifications, Smartphone authentication
주제어: Keystroke Dynamics, Distance-based classifications, Smartphone authentication, Keystroke Dynamics, Distance-based classifications, Smartphone authentication
정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석: 정보보안 교육 서비스 투자를 중심으로
이한솔,
채상미,
Vol. 28, No. 1, pp. 269-281,
2월.
2018
10.13089/JKIISC.2018.28.1.269
주제어: Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing, Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing
주제어: Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing, Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing
Cryptol을 이용한 국내 표준 블록 암호 모듈의 자동 정형 검증
최원빈,
김승주,
Vol. 28, No. 1, pp. 53-60,
2월.
2018
10.13089/JKIISC.2018.28.1.53
주제어: formal, Verification, cryptography, cryptol, saw, formal, Verification, cryptography, cryptol, saw
주제어: formal, Verification, cryptography, cryptol, saw, formal, Verification, cryptography, cryptol, saw
중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안
장 엽,
이우묘,
신혁기,
김신규,
Vol. 28, No. 1, pp. 123-133,
2월.
2018
10.13089/JKIISC.2018.28.1.123
주제어: Cyber Physical System, Stealthy Deception Attack, PLCitM (PLC in the Middle), Cyber Physical System, Stealthy Deception Attack, PLCitM (PLC in the Middle)
주제어: Cyber Physical System, Stealthy Deception Attack, PLCitM (PLC in the Middle), Cyber Physical System, Stealthy Deception Attack, PLCitM (PLC in the Middle)