References
- 민옥기, 이미영, 허성진, 김창수, 훤히 보이는 클라우드 컴퓨팅(ETRI easy IT), 전자신문사, 2009년 10월
- 마이클밀러 저, 최윤석 역, 사례로 읽는 클라우드 컴퓨팅, 에이콘출판사, 2009년 2월
- Cloud Security Alliance, Security Guidance for Critical areas of focus in cloud computing version 2.1, December, 2009 http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
- I. Verbauwhede, F. Hoornaert, J. Vandewalle, and H. De Man, "Security and Performance Optimization of a New DES Data Encryption Chip", IEEE Journal of Solid-State Circuits, 23(3):647-656, 1988 https://doi.org/10.1109/4.302
- Leander, C. Paar, A. Poschmann, K. Schramm "New Lightweight DES Variants", Fast Software Encryption 2007-FSE 2007, Luxembourg City, Luxembourg, Marz 26-28, 2007.A
- M. Feldhofer, J. Wolkerstorfer, V. Rijmen, "AES Implementation on a Grain of Sand", Information Security, IEE Proceedings, Vol. 152, Nr. 1, pp. 13-20, 2005 https://doi.org/10.1049/ip-com:20040966
- L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "Public-Key Cryptography for RFID-Tags", Proceedings of IEEE International Workshop on Pervasive Computing and Communication Security 2007, New York, USA 2007
- Yoonjeong Kim, SeongYong Ohm, Kang Yi, "Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm", IEICE transaction on Information Systems, Vol.E92-D, No.3, pp. 545-547, March, 2009 https://doi.org/10.1587/transinf.E92.D.545
- Johannes Wolkestorfer, Hardware Aspects of Elliptic Curve Cryptography, PhdThesis, Graz University of Technology, Graz, Austria, 2004
- SandeepKumar, ChristofPaar, "Reconfigurable Instruction Set Extension for enabling ECC on an 8-bit Processor", International Conference on Field-Programmable Logic and Applications (FPL) 2004, Antwerp, Belgium, August 30 -September 1, 2004
- Sandeep Kumar and Christof Paar, "Are Standards Compliant Elliptic Curve Cryptosystems feasible on RFID?", Workshop on RFID Security 2006, Graz, Austria, July, 2006
- HIGHT 블록암호 알고리즘 사양 및 세부 명세서, 한국인터넷진흥원, 2009
- Matsumoto, Kato, Imai, "Speeding up secret computations with insecure auxiliary devices", EuroCrypt'92, LNCS 658, Springer-Verlag, 1993, 153-162
- www.apple.co.kr, www.samsungmobile.com
- ENISA(European Network and Information Security Agency), Cloud Computing: Benefits, risks and recommendations for information security, November, 2009
- Cloud Security Alliance(CSA), Top Threats to Cloud Computing v1.0, March, 2010
- Nick Coblentz, Cloud Computing Data Security, March, 2004, http://nickcoblentz.blogspot.com/2009/03/cloud-computing-data-security.html
- Jon Brodkin, "Gartner: Seven cloud-computing security risks", Network World, July, 2008
- Cong Wang, Qui Wang, Kui Ren, Illinois Institute of Technology, "Ensuring Data Storage Security in Cloud Computing", IEEE International Workshop on Quality of Service(IWQoS), 2009
- Shucheng Yu., Cong Wan, Kui Ren, and Wenjing Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing", IEEE INFOCOM 2010, 2010.3
- Vishal Kher, Yongdae Kim, "Securing Distributed Storage: Challenges, Techniques, and Systems", ACM International Workshop on Storage Security and Survivability(StorageSS), 2005
- Pierangela Samarati, Sabrina De Capitani di Vimercati, "Data Protection in Outsourcing Scenarios: Issues and directions", ACM Symposium on Information, Computer and Communications Security(ASIACCS), 2010