Digital Library
Search: "[ keyword: Design ]" (13)
가명정보 생명주기에 따른 개인정보보호 중심 설계 적용 원칙에 관한 연구
김동현,
Vol. 32, No. 2, pp. 329-339,
4월.
2022
10.13089/JKIISC.2022.32.2.329
주제어: Personal Information, Pseudonymization Privacy by Design, De-Identification Privacy by Design
10.13089/JKIISC.2022.32.2.329
주제어: Personal Information, Pseudonymization Privacy by Design, De-Identification Privacy by Design
무기체계 개발을 위한 RMF A&A의 실증에 관한 연구
조광수,
김승주,
Vol. 31, No. 4, pp. 817-839,
8월.
2021
10.13089/JKIISC.2021.31.4.817
주제어: risk management, Risk Assessment, RMF A&A, Security by Design, Supply Chain Security
10.13089/JKIISC.2021.31.4.817
주제어: risk management, Risk Assessment, RMF A&A, Security by Design, Supply Chain Security
CIA-Level 기반 보안내재화 개발 프레임워크
강수영,
김승주,
Vol. 30, No. 5, pp. 909-928,
10월.
2020
10.13089/JKIISC.2020.30.5.909
주제어: Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering, Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering
10.13089/JKIISC.2020.30.5.909
주제어: Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering, Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering
연관키 차분 특성을 이용한 Fantomas와 Robin의 키 복구 공격
김한기,
김종성,
Vol. 28, No. 4, pp. 803-807,
7월.
2018
10.13089/JKIISC.2018.28.4.803
주제어: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack, Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack
10.13089/JKIISC.2018.28.4.803
주제어: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack, Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack