References
- OpenCableTM Technical Reports, “DCAS System Overview Technical Report,” OC-TR-DCAS-D02-060912, 2006.
- NCTA, “Report of the National Cable & Telecommunications Association on Downloadable Security,” 2005.
- http://www.opencable.com/dcas
- http://www.klabs.re.kr
- Ki Woong Park, Hyun Jin Choi, and Kyu Ho Park, “Intuitive interface device for wearable computers,” in Internation Conference on Next Generation PC, 2005.
- Jin-Bum Hwang, Do-Woo Kim, Yun-Kyung Lee and Jong-Wook Han, “Two Layered PKI Model for Device Authentication in Multi-Domain Home Network,” Consumer Electronics, 2006. ISCE '06. 2006 IEEE Tenth International Symposium on, 2006.
- 주식회사 데이콤, “이동 단말에서 마이크로 익스플로워를 이용한 공개키인증시스템 및 인증 방법”, 2000.
- 삼성전자 주식회사, “인증서를 이용한 기기 인증 방법 및 상기 방법을 이용하여 기기 인증을 수행하는 디지털 컨텐츠 처리기기”, 2003.
- 한국전자통신연구원, “P2P 네트워크에서 보안통신을 위한 키관리 방법 및 이를 위한 장치”, 2006.
- 삼성전자주식회사, “이동통신망에서 공개키 기반구조를 이용한 아이피 보안터널의 보안 방법 및 장치”, 2005.
- 에스케이 텔레콤주식회사, “유무선 통신망에서 무선 통신 단말기의 인증/과금 시스템 및 방법”, 2002.
- 주식회사 한마로, “인증서를 이용한 디지털 콘텐츠 인증 및 제어 시스템”, 2004.
- 방송통신위원회, “2008년 방송산업 실태조사 보고서”, 2008
- 국가정보원, “국가정보보호백서”, 2008.
- NIST, “Special Publication 800-57 : Recommendation for Key Management - Part 1: General (Revised),” 2007.
- 한국인터넷진흥원, “공인인증업무준칙 Ver 1.5”, 2009.
- 이종수, 조영상, 이정동, 이철용, “선택기반 확산 모형을 이용한 차세대 대형 TV의 수요예측”, 정보통신정책연구 제11권 제4호 pp.57-81, 2007.
- Yun-Kyung Lee, Deok Gyu Lee, Jong-Wook Han and Tai-Hoon Kim, “Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile,” The Computer Journal 2009 52(8):871-877, 2009. https://doi.org/10.1093/comjnl/bxn038
- Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won and Seungjoo Kim, “A proposal of appropriate evaluation scheme for exchangeable CAS (XCAS),” Information Security Practice and Experience Conference(ISPEC 2010), Seoul, Korea, March 12-13, 2010, pp.217-228.
- 성균관대학교 정보통신기술연구소, “키분배 프로토콜 설계에 관한 연구”, pp.138, 1999.
- Kyungah Shim, “Unknown key-share attack on authenticated multiple-key agreement protocol,” Electronics Letters, Vol.39, pp.38-39, 2003. https://doi.org/10.1049/el:20030076
- D. R. L. Brown and A. J. Menezes, “A small subgroup attack on a key agreement protocol of Arazi,” Technical report CORR 2001--50, Dept. of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario, 2001.
- Liqun Chen and Chris J. Mitchell, “Parsing ambiguities in authentication and key establishment protocols,” 30th September 2008.
- Dang Nguten Duc and Kwangjo Kim, “Securing HB+ against GRS Man-in-the-Middle Attack,” SCIS 2007, 2007.
- Chien-Lung Hsu, “Security of Chien et al.'s remote user authentication scheme using smart cards,” Computer Standards & Interfaces Vol.26, Issue 3, pp.167-169, May, 2004. https://doi.org/10.1016/S0920-5489(03)00094-1
- Narn-Yih Lee and Ming-Feng Lee, “Further improvement on the modified authenticated key agreement scheme,” Applied Mathematics and Computation Volume 157, Issue 3, pp.729-733, 15 October, 2004. https://doi.org/10.1016/j.amc.2003.08.057
- J. Reid, J.M.G. Nieto, T. Tang, and B. Senadji. Detecting Relay Attacks with Timing-Based Protocols. Proceedings of the 2nd ACM Symposium on Information, Computer, and Communications Security, 204-213, 2007.