Filters








292 Hits in 4.1 sec

Message from the General Co-Chairs

2021 2021 16th Asia Joint Conference on Information Security (AsiaJCIS)  
The success of the AsiaJCIS 2021 solely depends on your strong interests and active participations in this conference.  ...  The AsiaJCIS 2021 is organized by Korea Institute of Information Security and Cryptology (KIISC) and sponsored by Ministry of Science and ICT, Korea Internet & Security Agency (KISA), Telecommunications  ... 
doi:10.1109/asiajcis53848.2021.00005 fatcat:tmgu6snwzrdj3oqryc3qyddjga

AsiaJCIS 2020 Opinion

2020 2020 15th Asia Joint Conference on Information Security (AsiaJCIS)  
The success of the AsiaJCIS 2020 solely depends on your strong interests and active participations in this conference even in virtual participations.  ...  Finally, we hope that you can have an enjoyable and memorable experience for participating in physical or virtual and find lots of valuable information for your future research and development on information  ...  The success of the AsiaJCIS 2020 solely depends on your strong interests and active participations in this conference even in virtual participations.  ... 
doi:10.1109/asiajcis50894.2020.00005 fatcat:xi2wistomvgezm3c7i2sb5wyym

Page 2505 of Mathematical Reviews Vol. , Issue 95d [page]

1995 Mathematical Reviews  
Rhee, Research activities on cryptology in Korea (179-193); Session 6.  ...  Impromptu talks (6 papers). 95d:94002 94-06 94A60 ¥* Advances in cryptology —AUSCRYPT ’92.  ... 

Journal of Communications and Networks (JCN) - back inside cover

1999 Journal of Communications and Networks  
Theoretical research contributi ons presentin g new techn iques. concepts. or analyses. applied contribution s reporting on experiences and experiments. and tutorial expositions of permane nt reference  ...  The Korean Institute of Power Electronics, Korea Institute of Information Security and Cryptology. The Korean Institute of Electrical and Electronic Material Engineering.  ... 
doi:10.1109/jcn.1999.6597020 fatcat:3bhstbzihvbgfhx2tvo5hrnz4a

Assessing the computer network operations threat of foreign countries [chapter]

Dorothy Denning
2007 Contemporary Security Studies  
The potential consequences of cyber attacks will only get worse as our use of and reliance on information technologies increase.  ...  These actors penetrate computer networks in order to steal, degrade, and destroy information and information systems.  ...  That Iran has a Society of Cryptology, which has sponsored at least three conferences, is further proof of an active and established security research community.  ... 
doi:10.4324/9780203945636.ch8 fatcat:4mmberqrzrd6lg42toomrcuqh4

Mathematics Education for Gifted Students in Korea [chapter]

Hyunyong Shin, Inki Han
2004 Proceedings of the Ninth International Congress on Mathematical Education  
The purpose of this article is to introduce the gifted education of mathematics in Korea. We first discuss what is going on in Korea for mathematics education for gifted students.  ...  Some focus of this article is on proposing some teaching materials that are actively utilizing many basic concepts of cryptography and super-string theory, along with careful use of calculators and computers  ...  One unique characteristic in developing the teaching materials was actively utilizing many basic concepts of cryptology (cf. Fellows & Koblitz 1998) and superstring theory (cf.  ... 
doi:10.1007/978-94-010-9046-9_47 fatcat:lce234iqivd7db372kvipqutbu

Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework
하둡 프레임워크에서 한계점 가변으로 확장성이 가능한 P2P 봇넷 탐지 기법

Khalid Huseynov, Paul D. Yoo, Kwangjo Kim
2015 Journal of the Korea Institute of Information Security and Cryptology  
One source is the Traffic Lab at Ericsson Research in Hungary [33]. This traffic was integrated with second dataset built by Lawrence Berkeley National Lab (LBNL) [34].  ...  /16) subnets connected by the host. activity.  ... 
doi:10.13089/jkiisc.2015.25.4.807 fatcat:daijjeclpzdlpcwmghzlinfll4

Moving STEM Beyond Schools: Students' Perceptions About an Out-of-School STEM Education Program

Evrim Baran, Sedef Canbazoglu Bilici, Canan Mesutoglu
2016 International Journal of Education in Mathematics Science and Technology  
This research implemented an integrated out-of-school STEM education program for 6th grade students who come from disadvantaged areas in a large urban city in Turkey.  ...  The data source used in this study was the activity evaluation forms completed by the students at the end of each activity.  ...  Acknowledgements The research quoted in this chapter was supported by The Scientific and Technological Research Council of Turkey (project number 1059B291400247).  ... 
doi:10.18404/ijemst.71338 fatcat:6bmkspyxdbe4npqb4y72r46ofa

A Research Trend on Anonymous Signature and Authentication Methods for Privacy Invasion Preventability on Smart Grid and Power Plant Environments

Seung-Mo Je, Hanchul Woo, Jaehyeon Choi, Se-Hoon Jung, Jun-Ho Huh
2022 Energies  
This paper discusses both the research trends investigated by him and the limitations of the development research and future research in need.  ...  In the environment, smart devices can be media in the exposure of various and specific pieces of information as well as energy consumption.  ...  On 31 October 2018, the Korea Minting and Security Printing Corporation developed an in-house encryption module KShell42 Crypto V1.0, joined KCMVP, and made a plan for its active utilization in IoT and  ... 
doi:10.3390/en15124363 fatcat:urrqt2lixzd4lnghmgt77kuo4m

King of Spies: The Dark Reign of America's Spymaster in Korea. By Blaine Hardin. New York, Viking, 2017

Ed Hagerty
2017 Journal of Strategic Security  
He said he had married the woman in Korea, but she died in childbirth. No one else ever seemed to know anything about her.  ...  the outbreak of war in Korea.  ... 
doi:10.5038/1944-0472.10.4.1651 fatcat:lgx7i5umkngmbnrgzpajcq3hki

Iscs (Information Security Check Service) For The Safety And Reliability Of Communications

Jong-Whoi Shin, Jin-Tae Lee, Sang-Soo Jang, Jae-II Lee
2007 Zenodo  
The purpose of this paper is to introduce the new system of information security checking program in Korea and to propose synthetic information security countermeasures under domestic circumstances in  ...  order to protect physical equipment, security management and technology, and the operation of security check for securing services on ISP(Internet Service Provider), IDC(Internet Data Center), and e-commerce  ...  He is currently working to information infrastructure protection division in Korea Information Security Agency as a researcher.  ... 
doi:10.5281/zenodo.1075538 fatcat:nfiytyppwvagrkvmwggxk2kl4u

A study on effects of implementing information security governance by information security committee activities
정보보호 위원회 활동에 따른 정보보호 거버넌스 구현 효과에 관한 연구

Kunwoo Kim, Jungduk Kim
2015 Journal of the Korea Institute of Information Security and Cryptology  
In this situation, information security committee can be a good way to vitalize the commitment of top management and its activities are essential for implementing information security governance.  ...  The commitment of top management is still insufficient for information security even the core of information security governance is dependent on the leadership of top management.  ...  Research Model III.  ... 
doi:10.13089/jkiisc.2015.25.4.915 fatcat:yhz3toxsvbgpfkrrwxiha2rpna

An Improved One Round Authenticated Group Key Agreement
개선된 원 라운드 인증 그룹 키 합의 프로토콜

Ho-Hee Kim, Soon-Ja Kim
2013 Journal of the Korea Institute of Information Security and Cryptology  
In this paper, we propose a one round authenticated group key agreement protocol which uses one more key pair as well as the public key and private key of typical IBE(Identity-Based Encryption) system.  ...  Our protocol is secure and more efficient than their protocols in communication and computation costs.  ...  After that, many ID-based cryptographic protocols were developed based on pairings and is currently an area of very active research.  ... 
doi:10.13089/jkiisc.2013.23.1.003 fatcat:nxilk3drafelldsk52vedj7r2a

Research on online game bot guild detection method
온라인 게임 봇 길드 탐지 방안 연구

Harang Kim, Huy Kang Kim
2015 Journal of the Korea Institute of Information Security and Cryptology  
We demonstrate the feasibility of the proposed methods with real datasets from one of the popular online games named AION in Korea.  ...  In this paper, we propose a detection method for the gold farmers group on a basis of normal and bot guilds characteristic analysis.  ...  Network traffic analysis [7, 8] HOP Keyboard and mouse input patterns analysis [9, 10] CAPTCHA Using problems which are easy for human, difficult for bot [11, 12] Social network Difference of social activity  ... 
doi:10.13089/jkiisc.2015.25.5.1115 fatcat:jwepog3yzjbs5orqrgkh2kxr74

A research on detection techniques of Proxy DLL malware disguised as a Windows library : Focus on the case of Winnti
윈도우즈 라이브러리로 위장한 Proxy DLL 악성코드 탐지기법에 대한 연구 : Winnti 사례를 중심으로

JunSeok Koo, Huy Kang Kim
2015 Journal of the Korea Institute of Information Security and Cryptology  
In this paper, we perform research on detection techniques of Proxy DLL malware which is disguised as a Windows library through Winnti group case.  ...  Winnti is a group of Chinese hacking groups identified by research in the fall of 2011 at Kaspersky Lab.  ...  Country Company Korea ESTsoft Corp. Korea Kog Co., Ltd Korea MGAME Corp. Korea Sesisoft Korea Neowiz Korea/Philippines LivePlex Corp.  ... 
doi:10.13089/jkiisc.2015.25.6.1385 fatcat:ofvcwp2rcncjjbpecrkjpoch6a
« Previous Showing results 1 — 15 out of 292 results