References
- Chipcon Tech. Support, 'User Manual Rev. 2.0', Chip AS, (2004), www.chipcon.com
- Hwang-Hae Kyun, Sung-Jun Bae, 'I love ATMEGA128', Bok-Du Verlag, (2005)
- Duck-Yong Yun , 'AVR ATmega128 Master', (2004)
- Klaus Finkenzeller, ' RFID Handbook', John Wiley & Son, LTD, (1999)
- Jonathan Collins, 'FTC Asks RFID Users to Self- Regulate', RFID Journal, Mar. 10, (2005)
- E. Kaasinen, 'User Acceptance of MobileServices- Value. Ease of Use, Trust and Ease of Adoption,' doctoral dissertation, VTT 566, VTT Publication,(2005)
- Vinay Deolalikar, Malena Mesarina, John Recker, Salil Pradon,'Perturbative time and frequency allocations for RFID reader networks' (2006) USN
- Kyung-Hyup Lee, Yoon-Young An, Hee-Dong Park, You-Ze Cho,' A Data-centric Self-organization Schema for Energy-Efficient Wireless Sensor Networks' (2006) USN (USN 2006 in Seoul)
- Soo-Cheol Kim, Sang-Soo Yeo, Sung Kwon Kim, 'MARP: Mobile Agent for RFID Privacy Protection', 7th Smart Card Research and Advanced Application IFIP Conference (CARDIS '06), Lecture Notes in Computer Science, vol.3928, pp.300-312, April 2006
-
'FIPA Agent Management Specification,' FIPA 2004 Specification, Foundation for Intelligent Physical Agents, March 2004.
-
W. Jansen, T. Karygiannis, 'NIST Special Publication 800-19-Mobile Agent Security,
- W. Stalling, Cryptography and Network Security (4th edition), Prentice-Hall, 2006
- W. Trappe & L. Washington, Introduction to Cryptography with coding theory (2nd edition), Prentice-Hall, 2006
- NIST, 'Announcing the Advanced Encryption Standard (AES)', FIPS-197, Nov. 2001
- Daesung kwon, Jaesung Kim, Sangwoo Park, Soohak Sung, Yaekwon Sohn, Junghwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, and Jin Hong, 'New Block Cipher: ARIA,' LNCS 2971 - ICISC2003, pp.432-445, Springer, 2004
- KISA, Development of SEED, the 128-bit block cipher standard, Oct, 1998. (http://www.kisa.or.kr)
- A. Clark, E. Dawson, J. Fuller, J. Golic, Hoon-Jae Lee, W.Millan, Sang-Jae Moon, L. Simpson, 'The LILI-II Keystream Generator,' LNCS 2384, pp.25-39, Jul. 2002 (ACISP'2002)
- Kevin Chen, M. Henrickson, W.Millan, J. Fuller, A. Simpson, Ed Dawson, Hoonjae Lee, Sangjae Moon, 'Dragon: A Fast Word Based Stream Cipher,' LNCS (ICISC'2004)2004.12.2-12.3
- Hoonjae Lee, Sangjae Moon, 'Parallel Stream Cipher for Secure High-Speed Communications,' Signal Processing, Vol.82,No.2,pp.259-265, Feb, 2002 https://doi.org/10.1016/S0165-1684(01)00180-3
- Federal Information Processing Standards (FIPS) Publication 180-1, Secure Hash Standard (SHS), U.S. DoC/NIST, Aug. 1, 2002
- TTAS.KO-12.0011/R1, 'Hash Funtion Standard - part 2: Hash Function Algorithm Standard (HAS- 160),' Dec. 20, 2002. (http://www.tta.or.kr)
- R.C.Joshi and Shashikala Tapaswi, 'Frame Sliced Parallel Signature Files for Fast Colored Image Retrieval', JCIT:Journal of Convergence Information Technology, Vol.2 No.2, pp.5-9, 2007
- Sanjay Raghani, Durga Toshniwal and R. C. Joshi, 'Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach', JCIT:Journal of Convergence Information Technology, Vol.2 No.2, pp.10-21, 2007