1 |
ISO/IEC 7816-3 (2006): "Identification cards - Integrated circuit(s) cards with contacts, part3 : Cards with contacts - Electrical interface and transmission protocols."
|
2 |
ISO/IEC 7816-12 (2005): "Identification cards - Integrated circuit(s) cards with contacts, part12 : Cards with contacts - USB electrical interface and operating procedures."
|
3 |
java cipher(http://docs.oracle.com/javase/8/docs/api/crypto/chiper.html)
|
4 |
FIPS Pub. 197: Specification for the AES, Nov. 2001, availableat:http ://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
|
5 |
이상민, "최근 인증기술 관련 현황," 한국IT서비스산업협회, 2012.
|
6 |
google android, (http://www.android.com).
|
7 |
N. Haller, C. Metz, P. Nesser, and M. Staraw, "A One-Time Password System" RFC 2289, IETF, 1998.
|
8 |
사희석, 최중섭, 주필환, "윈도우 악성코드 분류방법론 설계," 정보보호학회논문지, 제19권, 제2호, 2009(4).
|
9 |
S. Gastellier-Prevost and M. Laurent, "Defeating pharming attacks at the client-side," 2011 5th International Conference on Network and System security, IEEE. pp.33-40, Sept. 2011.
|
10 |
김영수, 나중찬, 손승원, "패스워드 인증 프로토콜 동향," 전자통신동향분석, 제16권, 제6호, 2001(12).
|
11 |
ISO/IEC 7816-1 (1998): "Identification cards - Integrated circuit(s) cards with contacts, part1 : Physical characteristics."
|