References
- Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA), ANSI X9.31-1988, September 1998.
- Korea Internet & Security Agency, Research on the Actual condition of Electronic Signature System usage, Dec. 2013.
- Financial Security Agency, Financial sector encryption technology Administration Guide, Jan. 2010.
- Korea Internet & Security Agency, "KCAC.TS.CM-Certificate Management in Mobile Device" v1.30, Feb, 2012.
- Korea Internet & Security Agency, "KCAC.TS.UI-User Interface Specification for the Interoperability between Accredited Certification Authorities", v2.10, Apr. 2015.
- Korea Internet & Security Agency, "KCAC.TS.CMPAccredited Certificate Management Protocol Specification", v1.21, Sep. 2009.
- National Assembly, "Digital Signature Act(DSN)", Mar, 2013.
- S.R. Cho, D.S. Choi, S.H. Jin, H.H. Lee, "Passwordless Authentication Technology-FIDO", Electronics and Telecommunications Trends, Vol. 29, No. 4, pp.101-109, Aug. 2014.
- RSA, "PKCS #5 v2.0 : Password-Based Cryptography Standard", Mar. 1999.
- S.O. Hwang, "On the Security Proof of the Cramer-Shoup Public Key Cryptosystem," The Journal of The Institute of Webcasting, Internet Television and Telecommunication, Vol. 8, No. 6, pp. 15-20, 2008.
- Jong-Gun Song, Tae-Yong Kim, Hoon-Jae Lee, Won-Tae Jang, "A new password authentication scheme using two-way password in Smartphone Banking," The Journal of The Institute of Webcasting, Internet and Telecommunication, VOL. 12, No. 3, pp. 195-200, 2012. DOI: http://dx.doi.org/10.7236/JIWIT.2012.12.3.195
- Min-Sup Kang, "Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm," The Journal of The Institute of Webcasting, Internet Television and Telecommunication Vol. 8, No. 6, pp. 83-89, 2012.
- Soeui Kim, Duri Choi, Beongku An, "Detection and Prevention Method by Analyzing Malignant Code of Malignant Bot," The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 13 No. 2, pp. 199-207, 2013. DOI: http://dx.doi.org/10.7236/JIIBC.2013.13.2.199
- Jang-Il Kim, Hee-Seok Lee, Yong-Gyu Jung, "Malware Behavior Analysis based on Mobile Virtualization," The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 15 No. 2, pp. 1-7, 2015. DOI: http://dx.doi.org/10.7236/JIIBC.2015.15.2.1
- Jae-Kwan Choi, Ki-Young Lee, "Design and Implementation of the Security System using RFID and Biometric Information," The Journal of The Institute of Webcasting, Internet and Telecommunication, Vol. 10, No. 6, pp. 251-256, 2010.
- Farkhod Alisherov, "The Security in the Vehicular Ad Hoc Network (VANET) Using Expedite Message Authentication Protocol (EMAP)," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, ISSN:2383-5281, Vol. 1 No. 1, pp. 99-106, Dec. 2011. DOI: http://dx.doi.org/10.14257/AJMAHS.2011.12.03"
- C.-W. Park, J.-W. Son, H.-K. Hwang, K.-C. Kim, "Detection of systems infected with C&C Zeus through technique of Windows API hooking," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol. 5 No. 2, pp. 297-304, Apr. 2015. DOI: http://dx.doi.org/10.14257/AJMAHS.2015.04.11