1 |
Woo-Sik Eom, In-Oh Jeon, Development for Reliability Quality and Performance Evaluate Model of Fingerprint Recognition System, The Journal of the Korea Contents Association, Vol. 11, No. 2, p. 80, 2011. 2.
과학기술학회마을
DOI
ScienceOn
|
2 |
Jin-Young Lee, A Study on a Fingerprint Identification System Complemented with Additional Three-Dimensional Information, Journal of the Korea Academia-Industrial cooperation Society, Vol. 13, No. 3, p. 1318, 2012.
과학기술학회마을
DOI
ScienceOn
|
3 |
ISO/IEC 15408-1:2009, Information technology—Security techniques -- Evaluation criteria for IT security -- Part1:Introduction and general model, ISO, 2009.
|
4 |
ISO/IEC 15408-2:2008, Information technology-Security techniques-Evaluation criteria for IT security-Part2: security functional components, ISO, 2008.
|
5 |
ISO/IEC 15408-3:2008, Information technology-Security techniques-Evaluation criteria for IT security-Part3: Security assurance components, ISO, 2008.
|
6 |
http://word.tta.or.kr/terms/terms.jsp: Telecommunications Technology Association, TTA Terminology Dictionary.
|
7 |
Jaesung-Kim, Yaesung-Lee et al.,, Fingerprint Recognition System Protection Profile V2.0, Korea Information Security Agency & Sungkyunkwan University, 2008. 4.
|
8 |
ISO/IEC9126, Information Technology - Software Quality Characteristics and metrics.
|
9 |
ISO/IEC12119, Information Technology-Software Package-Quality requirement and testing.
|
10 |
National IT Industry Promotion Agency, Trend and Prospect of World Security Industry, NIPA, IT Industry Promotion Agency Annual Report, 2012.
|