1 |
J. K. Baek & J. P. Park. (2013). A Study on Personal Information Control and Security in Printed Matter. Journal of the Korea Academia-Industrial cooperation Society, 14(5), 2415-2421. DOI: http://dx.doi.org/10.5762/KAIS.2013.14.5.2415
DOI
|
2 |
J. S. Park & J. C. Ha. (2012). Vulnerability Analysis of Security Document Management in Multi Function Peripheral and Its Countermeasure. The Journal of Korean Institute of Information Technology, 10(6), 133-143. UCI : http://uci.or.kr/G704-001947.2012.10.6.009
|
3 |
T. W. Lee. (2012). A Study on Design and Implementation of Printer Security Integrated Management System. Master dissertation. Konkuk University, Seoul.
|
4 |
M. S. Yim. (2018). An Exploratory Research on Factors Influence Perceived Compliance Cost and Information Security Awareness in Small and Medium Enterprise, Journal of tne Korea Convergence Society, 9(9), 69-81.
|
5 |
S. K. Cho & M. J. Jun. (2012). Privacy Leakage Monitoring System Design for Privacy Protection. Journal of the Korea Institute of Information Security & Cryptology, 22(1), 99-106.
|
6 |
H. J. Lee & D. H. Won. (2011). A Protection Profile for E-Document Issuing System. Journal of the Korea Institute of Information Security & Cryptology, 21(6), 109-117.
|
7 |
I. J. Suk. (2016). Implementation of mobile printing system for security enhancement in the BYOD based mobile of ice environment. Master dissertation. Soongsil University, Seoul.
|
8 |
W. X. Liu, Y. L. Chen, N. F. Liao. (2011). Study of printing security based on grating phase encodin, JOURNAL OF OPTOELECTRONICS LASER, 22(11).
|
9 |
S. J. Simske, M. Sturgill, J. Aronoff & M. Vans. (2010). Factors in a Security Printing & Imaging Based Anti-Counterfeiting Ecosystem (Focal), International Conference on Digital Printing Technologies, 26.
|
10 |
RFC 1157 Simple Network Management Protocol (SNMP), http://www.faqs.org/rfcs/rfc1157.html
|
11 |
L. Lin & W. He. (2008),Status Quo of Security Printing-A Panoramic View at DRUPA, International Conference on Digital Printing Technologies, 24.
|
12 |
G. N. Pham, K. R. Kwon, E. J. Lee & S. H. Lee. (2017). Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain. Journal of Computing Science and Engineering, 11(4), 152-159. DOI : 10.5626/JCSE.2017.11.4.152
DOI
|
13 |
S. Simske, P. Mucher & C. Martinez. (2005). Digital Security Printing: Enabling Product Tracking and Authentication Using Existing Product Lines (Interactive), International Conference on Digital Production Printing and Industrial Applications.
|
14 |
Maleshliuski,S.,Gunter,R.(2010),Security Printing Techniques Based on Substrate and Print- Process Individualities, TAGA ProceedIngs.
|
15 |
RFC 3805 Printer MIB v2, http://www.faqs.org/rfcs/rfc3805.html
|
16 |
http://www.archives.go.kr/next/data/standardCondition.do
|
17 |
www.wowsoft.com
|
18 |
J. H. Shin & I. S. KIm. (2015). Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID. Journal of the Korea Institute of Information Security & Cryptology 25(6), 1435-1447. DOI : http://dx.doi.org/10.13089/JKIISC.2015.25.6.1435
DOI
|
19 |
L. S. Ho, S. E. A, H. S. Young, L. S. Ha & Pang Sechung. (2015). Printed Matter Security and Print Control System Using Print Data Collecting and Analysis. Proceedings of Symposium of the Korean Institute of communications and Information Sciences, 783-784.
|
20 |
S. G. Kim & W. S. Yoo. (2015). Development of a 3D Printing Open-market System for Copyright Protection and Remote 3D Printing. Journal of the Korean Institute of Industrial Engineers, 41(3), 253-258. DOI : http://dx.doi.org/10.7232/JKIIE.2015.41.3.253
DOI
|