1 |
http://www.math.oregonstate.edu/home/ programs/undergrad/CalculusQuestStudyGuides/ SandS/SeriesTests/telescoping.html
|
2 |
http://www.wolfram.com
|
3 |
James Manyika, Michael Chui, Brad Brown, Jacques Bughin, Richard Dobbs, Charles Roxburgh, Angela Hung Byers, "Big Data: The Next Frontier for Innovation, Competition, and Productivity," McKinsey Global Institute, 2011. 5.
|
4 |
Lohr, S. "The Age of Big Data," New York Times, http://www.nytimes.com/2012/02/12/ sunday-review/big-datas-impact-in-the-world. html?pagewanted=all, 2012
|
5 |
John Gantz, David Reinsel, "Extracting Value from Chaos," IDC IVIEW, 2011. 6.
|
6 |
http://en.wikipedia.org/wiki/2013_global_ surveill ance_disclosures
|
7 |
"개인정보 침해신고 상담 건수.연 : 2000-2012," 방송통신위원회(한국인터넷진흥원 개인정보침해신고센터), 2013. 10. 7
|
8 |
https://www.index.go.kr/egams/stts/jsp/potal/ stts/PO_STTS_IdxMain.jsp?idx_cd=1366&bbs= INDX_001
|
9 |
"개인정보보호법," 안전행정부(개인정보보호과) 02- 2100-2817, 법률 제11690호, 2013. 3. 23
|
10 |
강주성 외/ETRI부설국가보안기술연구소 역, "현대 암호학," 경문사, 2002
|
11 |
A. Diffie, M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory IT-26, no. 6., 1976, pp. 644-654.
|
12 |
R. L. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital. Signatures and Public-Key Cryptosystems," Communications of the ACM vol. 21., 1978, pp 8-10.
|
13 |
P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings, 35th Annual Symposium on Fundamentals of Computer Science (FOCS), 1994, pp. 124-134.
|
14 |
http://en.wikipedia.org/wiki/RSA_(algorithm)
|
15 |
Tom M. Apostol, "Calculus," Volume 1, Blaisdell Publishing Company, 1962, pp 422-423.
|
16 |
Brian S. Thomson, Andrew M. Bruckner, "Elementary Real Analysis Second Edition," CreateSpace, 2008, pp 85.
|