1 |
https://isms.islearning.kr/mik_lib/file_down.php?bf_idx=16
|
2 |
https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf
|
3 |
Jin-Young Kim and Sun-Myung Hwang, "Outlook and Challenges of Security System for the Activation of IoT", Korea Computer Congress, Korea Information Science Society, Jeju, 2015, pp. 1037-1039.
|
4 |
http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?curPage=1&menu_dist=1&seq=21742
|
5 |
http://kashi.or.kr/board/index.html?action=view&board_id=pds2&seq=13032
|
6 |
http://datanet.co.kr/news/articleView.html?idxno=69944
|
7 |
http://www.washingtonpost.com/wp-dyn/content/article/2008/06/05/AR2008060501858.html
|
8 |
http://online.wsj.com/article/SB123914805204099085.html
|
9 |
J. Daemen, V. Rijmen, "AES proposal: Rijndael", NISTAES Proposal, 1998, pp. 1-45.
|
10 |
NIST, "FIPS PUB 46-3 Data Encryption Standard (DES)", Federal Information Processing Standards Publications, 1999, pp. 1-22.
|
11 |
NIST, "FIPS PUB 180-4 Secure Hash Standard", Federal Information Processing Standards Publications, 2012, pp. 1-39.
|
12 |
IETF, "RFC-1321 The MD5 Message-Digest Algorithm", Network Working Group, 1992, pp. 1-22.
|
13 |
G. Bertoni, J. Daemen, M. Peeters and G. Van Assche, "The Keccak reference", round 3 submission to NIST SHA-3, 2011, pp. 1-69.
|
14 |
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, Vol.21, No. 2, 1978, pp. 120-126.
DOI
|
15 |
ITU-T, "Framework of Web of Things", Inernational Telecommunication Union, 2012, pp. 1-22.
|
16 |
J. Guo, T. Peyrin, and A. Poschmann, "The photon family of lightweight hash functions", in Crypto2011, Lncs, Vol. 6841, 2011, pp. 222-239.
|
17 |
A. Bogdanov, L. R. Knudsen, G. Le, C. Paar, A.Poschmann, M. J. B. Robshaw, Y. Seurin, and C.Vikkelsoe, "Present: An ultra-lightweight block cipher", In Proceedings of the International Conferenceon Cryptographic Hardware and Embedded Systems(CHES07), Vol. 4727, 2007, pp. 405-466.
|
18 |
C. Canniere, O. Dunkelman, M. Knezevic, Katan, and Ktantan, "A family of small and efficient hardware-oriented block ciphers", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 09), Vol. 5747, 2009, pp.272-288.
|
19 |
D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm", In Proceedings of the 7th International Conference on RFID Security and Privacy(RFIDSec'11), Vol. 7055, 2011, pp. 19-31.
|
20 |
D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B.Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim,J. Kim, and S. Chee, "Hight: a new block cipher suitable for low-resource device", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 06), Vol. 4269, 2006, pp. 46-59.
|
21 |
A. Bogdanov, M. Knezevic, G. Leander, D. Toz,K. Varici, I. Verbauwhede, and Spongent: "The design space of lightweight cryptographic hashing", http://sites.google.com/site/spongenthash, 2012.
|
22 |
Donghee Kim, Seokung Yoon, Yongpil Lee, "Security for the IoT Service", The Korean Institute of Communications and Information Sciences, Vol.30, No.8, 2013, pp.53-59.
|
23 |
http://www.zigbee.org
|
24 |
http://www.wi-fi.org
|