Digital Library
Search: "[ keyword: STR ]" (183)
전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구
한충희,
박순태,
이상준,
Vol. 29, No. 2, pp. 401-415,
3월.
2019
10.13089/JKIISC.2019.29.2.401
주제어: cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking, cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking, cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking
분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술
박환,
김미선,
서재현,
Vol. 29, No. 2, pp. 377-391,
3월.
2019
10.13089/JKIISC.2019.29.2.377
주제어: IoT, Distributed ledger, Tangle, access control, Token, IoT, Distributed ledger, Tangle, access control, Token
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: IoT, Distributed ledger, Tangle, access control, Token, IoT, Distributed ledger, Tangle, access control, Token
SDWSN 환경의 PUF 기반 그룹 키 분배 방법 개선
오정민,
정익래,
변진욱,
Vol. 29, No. 1, pp. 29-43,
1월.
2019
10.13089/JKIISC.2019.29.1.29
주제어: Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor, Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor, Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor
개인용 보안장치를 통한 안전한 분산형 암호 화폐 거래 모델
이창근,
김인석,
Vol. 29, No. 1, pp. 187-194,
1월.
2019
10.13089/JKIISC.2019.29.1.187
주제어: Distributed network, Flexible trading, HTLC, Cold wallet, Cryptocurrency exchange, Distributed network, Flexible trading, HTLC, Cold wallet, Cryptocurrency exchange
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Distributed network, Flexible trading, HTLC, Cold wallet, Cryptocurrency exchange, Distributed network, Flexible trading, HTLC, Cold wallet, Cryptocurrency exchange
안전한 6LoWPAN Neighbor Discovery 주소 등록 프로토콜
한상우,
박창섭,
Vol. 29, No. 1, pp. 17-28,
1월.
2019
10.13089/JKIISC.2019.29.1.17
주제어: 6LoWPAN, Neighbor Discovery, Address Registration, 6LoWPAN, Neighbor Discovery, Address Registration
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: 6LoWPAN, Neighbor Discovery, Address Registration, 6LoWPAN, Neighbor Discovery, Address Registration
X-box를 이용한 Session-oriented Cross play에 대한 보안 요구사항 분석
김동우,
강수영,
김승주,
Vol. 29, No. 1, pp. 235-255,
1월.
2019
10.13089/JKIISC.2019.29.1.235
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
AI 스피커의 보안성 평가 및 대응방안 연구
이지섭,
강수영,
김승주,
Vol. 28, No. 6, pp. 1523-1537,
11월.
2018
10.13089/JKIISC.2018.28.6.1523
주제어: AI Speaker, Threat modeling, STRIDE, LINDDUN, AI Speaker, Threat modeling, STRIDE, LINDDUN
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: AI Speaker, Threat modeling, STRIDE, LINDDUN, AI Speaker, Threat modeling, STRIDE, LINDDUN
HyMES에 대한 결합 확률 분포 기반 단일 파형 분석
박병규,
김수리,
김희석,
홍석희,
Vol. 28, No. 5, pp. 1099-1112,
9월.
2018
10.13089/JKIISC.2018.28.5.1099
주제어: HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution, HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution, HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution
주요국 사이버보안 거버넌스 분석과 정책적 시사점
주문호,
권헌영,
임종인,
Vol. 28, No. 5, pp. 1259-1277,
9월.
2018
10.13089/JKIISC.2018.28.5.1259
주제어: cybersecurity, Governance, Strategy, National Cybersecurity, Laws, cybersecurity, Governance, Strategy, National Cybersecurity, Laws
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: cybersecurity, Governance, Strategy, National Cybersecurity, Laws, cybersecurity, Governance, Strategy, National Cybersecurity, Laws
컴플라이언스 기반의 발전된 모바일 기기 생체 인증 모델
정용헌,
이경호,
Vol. 28, No. 4, pp. 879-888,
7월.
2018
10.13089/JKIISC.2018.28.4.879
주제어: Fin-tech, FIDO, Biometric Authentication, Trusted environment, Distributed management, Fin-tech, FIDO, Biometric Authentication, Trusted environment, Distributed management
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Fin-tech, FIDO, Biometric Authentication, Trusted environment, Distributed management, Fin-tech, FIDO, Biometric Authentication, Trusted environment, Distributed management