1 |
National Industry Security Center, Indstrial Security Information, retrieved May, 10th, 2013, from http://service4.nis.go.kr/servlet/page.
|
2 |
National Intelligence Service, Security Management Guidelines for Auxiliary Storage Media (Translated), July 2007.
|
3 |
S.-H. Lee and I.-Y. Lee, "A study on security solution for USB flash drive," J. Korea Multimedia Soc. (KMMS), vol. 13, no. 1, pp. 93-101, Jan. 2010.
과학기술학회마을
|
4 |
S.-H. Lee, J. Kwak, and I.-Y. Lee, "The study on the security solutions of USB memory," in Proc. 4th Ubiquitous Inform. Technol. Applicat. (ICUT 2009), pp. 1-4, Fukuoka, Japan, Dec. 2009.
|
5 |
S. H. Chung, J. S. Lee, and D. K. Kim, "Analysis on vulnerability of secure USB flash drive and countermeasure using PUF," in Proc. Inst. Electron. Eng. Korea (IEEK) SoC 2011, pp. 16-17, Cheongju, Korea, Apr. 2011.
|
6 |
M. Kim, H. Hwang, K. Kim, T. Chang, M. Kim, and B. Noh, "Vulnerability analysis method of software-based secure USB," J. Korea Inst. Inform. Security Cryptology (KIISC), vol. 22, no. 6, pp. 1345-1354, Dec. 2012.
과학기술학회마을
|
7 |
M. Han, "Trends for security techniques of USB and products (Translated)," IITA Weekly Technol. Trends, vol. 1380, no. 1380, pp. 14-20, Jan. 2009.
|
8 |
H. Lee, C. Park, G. Lee, K. Kim, and S. Lee, "An analysis on secure USB at the point of forensic view (Translated)," in Proc. Korean Soc. Broadcast Eng. (KSOBE) Conf. 2008, pp. 63-65, Seoul, Korea, Feb. 2008.
|
9 |
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. 44th ACM Annu. Design Automation Conf. (DAC '07), pp. 9-14, San Diego, U.S.A., June 2007.
|
10 |
S. W. Jung, and S. Jung, "HRP: A HMAC-based RFID mutual authentication protocol using PUF," in Proc. Int. Conf. Inform. Networking (ICOIN 2013), pp. 578-582, Bangkok, Thailand, Jan. 2013.
|
11 |
J. Lee, M. Park, and S. Jung, "OTP-based transaction verification protocol using PUFs," J. Korea Inform. Commun. Soc. (KICS), vol. 38B, no. 6, pp. 492-500, June 2013.
과학기술학회마을
DOI
ScienceOn
|
12 |
S.-M. Yoo, D. Kotturi, D. W. Pan, and J. Blizzard, "An AES crypto chip using a high-speed parallel pipelined architecture," Microprocessors and Microsystems, vol. 29, no. 7, pp. 317-326, Sep. 2005.
DOI
ScienceOn
|
13 |
Wikipedia, TrueCrypt, retrieved May, 10th, 2013, from http://en.wikipedia.org/wiki/TrueCrypt.
|
14 |
H.-J. Jeong, Y.-S. Choi, W.-R. Jeon, F. Yang, S.-J. Kim, and D.-H. Won, "Analysis on vulnerability of secure USB flash drive and development protection profile based on common criteria version 3.1," J. Korea Inst. Inform. Security Cryptology (KIISC), vol. 17, no. 6, pp. 99-119, Dec. 2007.
과학기술학회마을
|