Acknowledgement
Supported by : 지식경제부
References
- D. W. Kim, J. W. Han, and K. I. Chung, "Trend of Home Device Authentication/Authorization Technology", Weekly IT BRIEF, No. 1329, pp. 1-11, 2008.
- J. H. Kim, J. W. Gi, and C. K. Kim, "A User Authentication Method between Domains Using Privilege Certificates", Korea Institute of Information Security&Cryptology, Journal of KIISC, 18(6A), pp. 75-83, Dec. 2008.
- J. S. Moon, D. G. Lee, I. Y. Lee, "Device Authentication/Authorization PRotocol for Home Network in Next Generation Security", Advances in Information Security and Assurance(ISA 2009), LNCS 5576, pp. 760-768, Jun. 2009.
- S.Y. Lee, K.B. Yim, K.J. Bae, Taeyoung Jeong, and Jong-Wook Han, "Counterplan of Ubiquitous Home Network Privacy based on Device Authentication and Authorization," Korea Institute of Information Security & Cryptology, Review of KIISC, 18(5), pp.125-131, Oct. 2008.
- W.J. Lee, and I.S. Jeon, "Attribute-base Authenticated Key Agreement Protocol over Home Network", Journal of Korea Institute of Information Security & Cryptology (KIISC), 18(5), pp.49-57, Oct. 2008
- "Device Certificate Profile for the Home Network", TTAS.KO-12.0052, 2007.
- STEALTH MXP FAMILY MXI Security, http://www.mxisecurity.com/
- IronKey, https://www.ironkey.com/
- P. J. Bakker et al. "Investing Secure USB sticks", Nov. 2007.
- S. H. Lee, J. Kwak and I. Y. Lee, "The Study on The Security Solutions of USB Memory", Proceedings of the 4th International Conference Ubiquitous Information Technologies & Applications, 2009(ICUT'09), pp. 1-4, Dec. 2009.