Digital Library
Search: "[ keyword: Document ]" (11)
A Study of Office Open XML Document-Based Malicious Code Analysis and Detection Methods
Deokkyu Lee,
Sangjin Lee,
Vol. 30, No. 3, pp. 429-442,
Jun.
2020
10.13089/JKIISC.2020.30.3.429
Keywords: OOXML, Microsoft Office, documents, Malware

Keywords: OOXML, Microsoft Office, documents, Malware
Study on History Tracking Technique of the Document File through RSID Analysis in MS Word
전지훈,
한재혁,
정두원,
이상진,
Vol. 28, No. 6, pp. 1439-1448,
Dec.
2018
10.13089/JKIISC.2018.28.6.1439
Keywords: Revision Identifier, Document forensics, OOXML, MS Word, Revision Identifier, Document forensics, OOXML, MS Word

Keywords: Revision Identifier, Document forensics, OOXML, MS Word, Revision Identifier, Document forensics, OOXML, MS Word
Method of Fuzzing Document Application Based on Android Devices
Je-Gyeong Jo,
Jae-Cheol Ryou,
Vol. 25, No. 1, pp. 31-38,
Feb.
2015
10.13089/JKIISC.2015.25.1.31
Keywords: Smartphone, Android, Fuzzing, Document, Vulnerability

Keywords: Smartphone, Android, Fuzzing, Document, Vulnerability
Study on Security Grade Classification of Financial Company Documents
Bu Il Kang,
Seung Joo Kim,
Vol. 24, No. 6, pp. 1319-1328,
Dec.
2014
10.13089/JKIISC.2014.24.6.1319
Keywords: Personal Information, leakage of personal Information, Security grade classification of document

Keywords: Personal Information, leakage of personal Information, Security grade classification of document
A Study on Edit Order of Text Cells on the MS Excel Files
Yoonmi Lee,
Hyunji Chung,
Sangjin Lee,
Vol. 24, No. 2, pp. 319-326,
Apr.
2014
10.13089/JKIISC.2014.24.2.319
Keywords: Digital Forensics, MS Excel, Document File Forensics, OOXML File Format, Compound Document File Format

Keywords: Digital Forensics, MS Excel, Document File Forensics, OOXML File Format, Compound Document File Format
A system for detecting document leakage by insiders through continuous user authentication by using document reading behavior
Sungyoung Cho,
Minsu Kim,
Jongil Won,
SangEun Kwon,
Chaeho Lim,
Brent ByungHoon Kang,
Sehun Kim,
Vol. 23, No. 2, pp. 181-192,
Apr.
2013
10.13089/JKIISC.2013.23.2.181
Keywords: Document Reading, Continuous Authentication Insider Threat Detection

Keywords: Document Reading, Continuous Authentication Insider Threat Detection
Security Analysis on Digital Signature Function Implemented in Electronic Documents Software
Sunwoo Park,
Changbin Lee,
Kwangwoo Lee,
Jeeyeon Kim,
Youngsook Lee,
Dongho Won,
Vol. 22, No. 5, pp. 945-958,
Oct.
2012
10.13089/JKIISC.2012.22.5.945
Keywords: Electronic Documents, Electronic Document Software, Digital signature, PDF, MS Word, Hancom Hangul

Keywords: Electronic Documents, Electronic Document Software, Digital signature, PDF, MS Word, Hancom Hangul
A Protection Profile for E-Document Issuing System
Hyun-Jung Lee,
Dong-Ho Won,
Vol. 21, No. 6, pp. 109-118,
Dec.
2011
10.13089/JKIISC.2011.21.6.109
Keywords: E-Document Issuing System, Common Criteria, Protection profile

Keywords: E-Document Issuing System, Common Criteria, Protection profile
Secure Index Searching Schemes for Groups
Park Hyun-A,
Byun Jin-Uk,
Lee Hyun-Suk,
Lee Dong-Hun,
Vol. 15, No. 1, pp. 87-98,
Feb.
2005
10.13089/JKIISC.2005.15.1.87
Keywords: Index search, Privacy, trapdoor, keyword, encrypted documents

Keywords: Index search, Privacy, trapdoor, keyword, encrypted documents