1 |
J. Kurihara, S. Kiyomoto, K. Fukushima, and T. TanakavA, "New (k, n)-Threshold Secret Sharing Scheme and Its Extension," 11th Information Security Conference ISC '08, 2008.
DOI
ScienceOn
|
2 |
F. Chang, J. Dean, S. Ghemawat, W. Hsieh, D. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. Gruber, "Bigtable: A Distributed Storage System for Structured Data," In Proc. of the 7th OSDI, 2006.
|
3 |
桑門秀典,神戸大学, "暗号システムの安全性を向上させる暗号化モードに関する研究(継続)", 電気 通信普及財団, 研究調査報告,No.19,pp.236,2004.
|
4 |
石津晴崇, 荻原利彦, "電子データの長期保管に関する一考察", 電子情報通信学会2004年総合大会講 演論文集, D-9-10, 2004.
|
5 |
이일우, 한동원, “IT기반의 스마트 그리드 기술”, 한국정보기술학회지, 제7권, 제1호, pp.25-30, 2009.
|
6 |
박찬국, “전력인프라 사이버보안 이슈와 정책 대응”, 주간기술동향, 제1398호, pp.1-10, 2009.
|
7 |
김형준, "Neptune : 대용량 분산 데이터 관리 시스템,” NHN, 2008.
|
8 |
박남제, “안전한 모바일 RFID리더를 위한 개방형임베디드 소프트웨어 플랫폼 구현방안”, 한국통신학회논문지, 제35권, 제5호, pp.785-793, 2010.
|
9 |
A. Shamir, "How to Share a Secret," Communication of the ACM, Vol.22, No.11. pp.612-613, 1979.
DOI
ScienceOn
|
10 |
R. L. Rivest, "All-or-nothing encryption and the package transform," Fast Software Encryption FSE '97, Lecture Notes in Computer Science, Vol.1267, pp.210-218, 1997.
|
11 |
D. R. Stinson, "Something about all or nothing (transform)," Designs, Codes and Cryptography, Vol.22, pp.133-138, 2001.
DOI
|
12 |
U. S. Department of Commerce, "(Draft) NISTIR 7628, Smart Grid Cyber Security Strategy and Requirements," September 2009.
|
13 |
H. Kuwakado and H. Tanaka, "Strongly non-separable encryption mode for throwing a media away," Technical Report of IEICE, Vol.103, No.417, pp.15-18, 2003.
|
14 |
V. Boyko, "On the security properties of OAEP as an all-or-nothing transform," Advances in Cryptology - CRYPTO ’99, Lecture Notes in Computer Science, Vol.1666. pp.503-518, 1999.
DOI
|
15 |
Office of Electricity Delivery and Energy Reliability, "A System view of the modern Grid," NETL, 2007.
|
16 |
M. Bellare, P. Rogaway, "Optimal asymmetric encryption," Lecture Notes in Computer Science Advanced in Cryptology EUROCRYPT ’94, Vol.950, pp.92-111, 1994.
|
17 |
M. Tada, Y. Fujii, N. Hosaka, K. Tochikubo, and T. Kato, "A secret sharing scheme with0 threshold 3," Proc. CSS2005, pp.637-642, 2005.
|
18 |
Y. Fujii, M. Tada, N. Hosaka, K. Tochikubo, and T. Kato, "A fast (2, n)-threshold scheme and its application," Proc. CSS2005, pp.631-636, 2005.
|
19 |
J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, "A fast (3, n)-threshold secret sharing scheme using exclusive-or operations," IEICE Trans. Fundamentals, vol.E91-A, No.1.pp.127-138, 2008.
DOI
ScienceOn
|
20 |
U. S. Department of Commerce, "NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 1.0 (Draft)," pp.83-84, 2009(9).
|
21 |
P. McDaniel, S. McLaughlin, "Security and Privacy Challenges in the Smart Grid," IEEE Security and Privacy, Vol.7, No.3, pp.75-77, 2009.
DOI
ScienceOn
|
22 |
C. Wolf and W. Maxwell, "Smart Grids And Privacy," Communications & Strategies, No.76, pp.127-130, 2009.
|
23 |
A. Cavoukian, J. Polonetsky, and C. Wolf, "SmartPrivacy for the Smart Grid: Embedding Privacy in the Design of Electricity Conservation," The Future of Privacy Forum, 2009(11).
|