On the Security of Public-Key-Certificate-Relay Protocol for Smart-Phone Banking Services |
Shin, DongOh
(인하대학교 컴퓨터정보공학과 정보보호연구실)
Kang, Jeonil (인하대학교 컴퓨터정보공학과 정보보호연구실) Nyang, DaeHun (인하대학교 컴퓨터정보공학과 정보보호연구실) Lee, KyungHee (수원대학교 전기공학과) |
1 | Korea Commun. Commission, "Statistics of subscribers to telecommunications services," Retrieved from http://www.itstat.go.kr/board/boardDetailView. htm?identifier=02-008-120529-000003, Apr. 2012. |
2 | Law no. 10008, "Electronic signatures act," Feb. 2010. |
3 | Korea Internet & Security Agency, "Certificate transmission between PC to mobile device," Mar. 2010. |
4 | Java Decompiler-Graphic User Interface, Retrieved from http://java.decompiler.free.fr/, June 2012. |
5 | JAva Decompiler, Retrieved from http://en.wikipedia.org/wiki/JAD_(JAva_Decompiler), June 2012. |
6 | B. Schneier, Applied cryptography, 2nd Ed., John Wiley & Sons. ISBN 0-471-11709-9, pp. 153-154, 1996. |
7 | PKCS#8 v1.2, "Private key information syntax standard," May 2008. |
8 | PKCS#5 v2.0, "Password-based cryptography standard," Mar. 1999. |
9 | C. Ellison, "Cryptographic random numbers," IEEE P1363 Appendix E, Draft v1.0, Retrieved from http://world.std.com/-cme/P1363/ranno.html, Nov. 1995. |
10 | SecureRandom, Retrieved from http://developer.android.com/reference/java/sec urity/SecureRandom.html, June 2012. |
11 | SecRandomCopyBytes, Retrieved from http://developer.apple.com/library/ios/#DOCU MENTATION/Security/Reference/Randomizati onReference/Reference/reference.html, June 2012. |
12 | E. Barker, "Recommendation for key management - Part 1: General rev.3," NIST Special Pub. 800-57, May 2011. |
13 | DaeHun Nyang, "System and method for transmitting certificate to mobile apparatus and system and method for transmitting and certifying data using multi-dimensional code," Pat. no. KR-10-1113446, Dec. 2010. |
14 | A. Kerckhoffs, "La cryptographie militaire," Jour. des sciences militaires, IX, pp. 5-38, Jan. 1883. |