References
- Cisco, "Cisco Annual Internet Report," 2021 [Online]. Available: https://www.cisco.com/c/en/us/solutions/executive-perspectives/annual-internet-report/index.html.
- Z. Shelton and C. H. Yu, "PDF readability enhancement on mobile devices," in Proceedings of the 17th International Web for All Conference, Taipei, Taiwan, 2020, pp. 1-4.
- R. H. Sprague, "Electronic document management: challenges and opportunities for information systems managers," MIS Quarterly, vol. 19, no. 1, pp. 29-49, 1995. https://doi.org/10.2307/249710
- H. C. Kim, "Issues and subjects of the framework act on electronic document and electronic commerce," Law Studies, vol. 15, no. 2, pp. 293-322, 2012.
- J. E. Warnock and C. Geschke, "Founding and growing Adobe Systems, Inc.," IEEE Annals of the History of Computing, vol. 41, no. 3, pp. 24-34, 2019. https://doi.org/10.1109/MAHC.2019.2923397
- S. Rohlmann, V. Mladenov, C. Mainka, and J. Schwenk, "Breaking the specification: PDF certification," in Proceedings of 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2021, pp. 1485-1501.
- W3C, "HTML 5.2," 2023 [Online]. Available: https://www.w3.org/TR/html52/.
- G. Sekar and S. Bhattacharya, "Practical (second) preimage attacks on the TCS_SHA-3 family of cryptographic hash functions," Journal of Information Processing Systems, vol. 12, no. 2, pp. 310-312, 2016. https://doi.org/10.3745/JIPS.03.0021
- H. Gilbert and H. Handschuh, "Security analysis of SHA-256 and sisters," in Selected Areas in Cryptography. Heidelberg, Germany: Springer, 2013, pp. 175-193.
- S. Manuel and T. Peyrin, "Collisions on SHA-0 in one hour," in Fast Software Encryption. Heidelberg, Germany: Springer, 2008, pp. 16-35.
- J. H. Song, S. S. Kim, and M. S. Jun, "Diffie-Hellman based asymmetric key exchange method using collision of exponential subgroups," KIPS Transactions on Software and Data Engineering, vol. 9, no. 2, pp. 39-44, 2020. https://doi.org/10.3745/KTSDE.2020.9.2.39
- S. Contini, "The factorization of RSA-140," RSA Laboratories' Bulletin, vol. 1999, no. 10, pp. 1-2. 1999.
- R. Perlman, "An overview of PKI trust models," IEEE Network, vol. 13, no. 6, pp. 38-43, 1999. https://doi.org/10.1109/65.806987
- M. Toyoda and M. Kitsuregawa, "The history of web archiving," Proceedings of the IEEE, vol. 100(Special Centennial Issue), pp. 1441-1443, 2012. https://doi.org/10.1109/JPROC.2012.2189920
- J. Palme and A. Hopmann, "MIME E-mail encapsulation of aggregate documents, such as HTML (MHTML)," Internet Engineering Task Force, Fremont, CA, RFC2110, 1997.
- L. Masinter, "The 'data' URL scheme," Internet Engineering Task Force, Fremont, CA, RFC 2397, 1998.
- H. C. Hwang and W. J. Kim, "Design of document-HTML generation technique for authorized electronic document communication," Journal of Society of Korea Industrial and Systems Engineering, vol. 44, no. 1, pp. 51-59, 2021. https://doi.org/10.11627/jkise.2021.44.1.051
- B. Choi, J. Lee, S. Park, and J. Lee, "A model-based interface to cloud services for intelligent service robots," KIPS Transactions on Software and Data Engineering, vol. 9, no. 1, pp. 1-10, 2020. https://doi.org/10.3745/KTSDE.2020.9.1.1