References
- 강전일, 박주성, 양대헌, 'RFID 시스템에서의 프라이버시 보호 기술', 한국정보보호학회학회지, 제14권 6호, pp. 28-36, 2004
- 변창우, 박석, 손상혁, '센서 네트워크 환경에서 의 데이터 관리', 정보과학회지, 제 22권 제12 호,pp. 31-40, 2004
- 한국전산원, '유비쿼터스 사회의 발전단계와 특 성', NCA CIO Report, 04-16호
- 유승화, 'RFID/USN 표준화 추진방향', TTA 저널, 제 94호, pp. 12-18
- 임근수, 김지홍, 고건, '센서 네트워크를 위한 저전력 통신 기법, 정보과학회지, 제 22권 제12 호, 2004, pp. 21-30, 2004
- 임지형, 이병길, 김현곤, 정교일, 양대헌, '유비 쿼터스 및 Ad Hoc 네트워크 망에서의 정보보 호 분석', 한국정보통신연구진흥원(IITA)
- 정병호, 'RFID/USN 환경에서의 정보보호', 제9회 정보보호심포지움, pp 447-463, 2004
- 제 4차 빅브라더 보고서, RFID와 프라이버시
- 주학수, 'RFID 시스템의 보안 및 프라이버시 보 호를 위한 기술 분석', IT리포트, 전자정보센터
- Haowen Chan, Adrian Perrig, Dawn Song, 'Random Key Predistribution Schemes for Sensor Networks' In 2003 IEEE Symposium on Research in Security and Privacy
- M. Covington, M. Moyer, and M. Ahamad, 'Generalized role-based access control for securing future applications', In 23rd National Information Systems Security Conference, Baltimore, MD, October 2000
- Laurent Eschenauer and Virgil D. Gligor, 'A keymanagement scheme for distributed sensor networks' In Proceedings of the 9th ACM Conference on Computer and Communication Security, pages 41–47, November 2002
- Ari Juels and Ravikanth Pappu, 'Squealing Euros: Privacy Protection in RFIDEnalbed Banknotes', Financial Cryptography 2003, Springer-Verlag, 2003
- Ari Juels, Ronald L. Rivest, and Michael Szydlo, 'The Block Tag: Selective Blocking of RFID Tags for Consumer Privacy', 8th ACM Conference on Computer and Communications Security, pp. 103-111, ACM Press, 2003
- D. Liu, P. Ning, K. Sun, 'Efficient selfhealing group key distribution with revocation capability', Proceedings of the 10th ACM conference on Computer and communication security, 2003
- D. Liu and P. Ning, 'Establishing Pairwise Keys in Distributed Sensor Networks', The 10th ACM Conference on Computer and Communications Security, 2003
- James Newsome, Elaine Shi, Dawn Song and Adrian Perrig, 'The Sybil Attack in Sensor Networks : Analysis and Defenses', In Third International Symposium on Information Processingin Sensor Networks (IPSN 2004)
- Yih-Chun Hu, Adrian Perrig, and David B. Johnson, 'Packet Leashes: ADefense against Wormhole Attacks in Wireless Ad Hoc Networks', In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), April 2003
- Neumann G, Strembeck M., 'Design and implementation of a flexible RBACservice in an object-oriented scripting language', Proceedings of the 8th ACM Conference on Computer and Communication Security, Philadelphia, PA, November 2001
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, 'SPIN: Security Protocols for Sensor Networks', Wireless Networks Journal, 8(5):521-534, Sep 2002 https://doi.org/10.1023/A:1016598314198
- David J. Wheeler and Robert M. Needham, 'TEA, a Tiny Encryption Algorithm', Technical report, Computer Laboratory, University of Cambridge, 1995
- Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels, 'Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems', First International Conference on Security and Pervasive Computing, 2003
- 임종인, '유비쿼터스 네트워크 보안', 고려대학교 정보보호 대학원, 2004. 8 (http://www.secui. com/seminar/ IPS_ubiquitous.pdf)