References
- Leveraging FIDO Standards to Extend the PKI Security Model in United States Government Agencies. FIDO Alliance White Paper, https://fidoalliance.org, 2017
- E. Bertino, D. Lin, and W. Jiang, "A Survey of Quantification of Privacy Preserving Data Mining Algorithms," In Privacy-Preserving Data Mining: Models and Algorithms, vol.34, pp.183-205, Kluwer Academic Publishers, Jun. 2008.
- M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers. Format-preserving encryption. Selected Areas in Cryptography - SAC 2009. Lecture Notes in Comput. Sci., vol. 5867, pp. 295-312, 2009
- D. Sacharidis, K. Mouratidis and D. Papadias, "k-Anonymity in the Presence of External Databases," IEEE Transactions on Knowledge and Data Engineering, 2010.
- 송유진, 박광용, “데이터베이스 아웃소싱을 위한 준동형성 암호기술”, 정보보호학회지, 제19권, 제3호, pp.80-89, 2009.
- K. Veeramachaneni, I. Arnaldo AI2: training a big data machine to defend IEEE international conference on big data security on Cloud (BigDataSecurity 2016) (2016)
- https://www.fbi.gov/services/cjis/fingerprints-and-other-biometrics/ngi
- Meng Zhang, Anand Raghunathan, and Niraj K. Jha. MedMon: Securing medical devices through wireless monitoring and anomaly detection, IEEE Transactions on Biomedical Circuits and Systems
- Stan Higgins (July 21, 2015). "Inside R3CEV's Plot to Bring Distributed Ledgers to Wall Street“
- KOTRA, 워싱턴무역관, "미국 사이버보안시장 동향과 우리기업 진출을 위한 시사점", 2016.8