1 |
http://terms.naver.com/entry.nhn?docId=2073350&cid=208&categoryId=208#TABLE_OF_CONTENT1
|
2 |
http://northface32.blog.me/50120464405
|
3 |
Daniel D. Lam, "Automated user authentication identification for customized converged services, " US Patent, US 8650628 B2, 2014
|
4 |
http://cafe.naver.com/softwarequality/book1621832/758
|
5 |
http://www.cyworld.com/B166er/6718585
|
6 |
Sviatoslav Voloshynovskiy, Oleksiy Koval, Thierry Pun, "Secure item identification and authentication system and method based on unclonable features," US Patent, US 8705873 B2, 2014
|
7 |
Won-Hee Nam, Dea-Woo Park, "A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority, " The Journal of the Korean Institute of Information and Communication Engineering, Vol. 15, No. 6, pp. 1320-1326, 2011. 6
과학기술학회마을
DOI
ScienceOn
|
8 |
G. McGraw, "Software assurance for security, " IEEE Computer, vol. 32, pp. 103-105, Apr. 1999.
DOI
ScienceOn
|
9 |
Yoon Jae-Ho, "A Study on Identification & Authentication in Enrollment Systems," Thesis of Master of Engineering, Dept. of Graduate School of Sejong University, 2004
|
10 |
Yoon-Su Jeong, "Design of Patient Authentication Model in u-healthcare Environment using Coalition ID," Jouranl of Digital Convergence Vol. 11, No. 3, pp. 3-5-310, 2013. 2
과학기술학회마을
DOI
|
11 |
Jonghoon Lee, Jungsoo Park, Seung Wook Jung, Souhwan Jung, "The Authentication and Key Management Method based on PUF for Secure USB," J-KICS, Vol. 38B, No. 12, pp. 944-953, 2013.12
과학기술학회마을
DOI
ScienceOn
|
12 |
Seong-Yoon Shin, Dai-Hyun Jang, Hyeong-Jin Kim, "A Study on Security Measure of Step-Wise Project," Journal of the Korea Institute of Information and Communication Engineering, Vol. 18, No. 4, pp. 771-778, Apr. 2012
|