4차 산업혁명과 정보보호 기술

  • 김익균 (한국전자통신연구원 정보보호연구본부) ;
  • 나중찬 (ETRI 시스템보안연구그룹) ;
  • 김수형 (한국전자통신연구원 정보보호연구본부) ;
  • 진승헌 (한국전자통신연구원 정보보호연구본부)
  • Published : 2017.09.30

Abstract

Keywords

References

  1. Leveraging FIDO Standards to Extend the PKI Security Model in United States Government Agencies. FIDO Alliance White Paper, https://fidoalliance.org, 2017
  2. E. Bertino, D. Lin, and W. Jiang, "A Survey of Quantification of Privacy Preserving Data Mining Algorithms," In Privacy-Preserving Data Mining: Models and Algorithms, vol.34, pp.183-205, Kluwer Academic Publishers, Jun. 2008.
  3. M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers. Format-preserving encryption. Selected Areas in Cryptography - SAC 2009. Lecture Notes in Comput. Sci., vol. 5867, pp. 295-312, 2009
  4. D. Sacharidis, K. Mouratidis and D. Papadias, "k-Anonymity in the Presence of External Databases," IEEE Transactions on Knowledge and Data Engineering, 2010.
  5. 송유진, 박광용, “데이터베이스 아웃소싱을 위한 준동형성 암호기술”, 정보보호학회지, 제19권, 제3호, pp.80-89, 2009.
  6. K. Veeramachaneni, I. Arnaldo AI2: training a big data machine to defend IEEE international conference on big data security on Cloud (BigDataSecurity 2016) (2016)
  7. https://www.fbi.gov/services/cjis/fingerprints-and-other-biometrics/ngi
  8. Meng Zhang, Anand Raghunathan, and Niraj K. Jha. MedMon: Securing medical devices through wireless monitoring and anomaly detection, IEEE Transactions on Biomedical Circuits and Systems
  9. Stan Higgins (July 21, 2015). "Inside R3CEV's Plot to Bring Distributed Ledgers to Wall Street“
  10. KOTRA, 워싱턴무역관, "미국 사이버보안시장 동향과 우리기업 진출을 위한 시사점", 2016.8