1 |
김이남, '병렬처리를 통한 AES 알고리즘에 관한 연구', 석사학위논문, Dec. 2002
|
2 |
Association for Automation Identification and Data Capture Technologies (AIM) (2002), Shrouds of Time: The History of RFID. http://www.aimglobal.org, Last accessed August 22, 2004
|
3 |
Gildas Avoine and Philippe Oechslin. 'A scalable and provably secure hash based RFID protocol'. In IEEE International Workshop on Pervasive Computing and Communication Security - PerSec 2005, Kauai Island, Hawaii, USA, March 2005. IEEE, IEEE Computer Society Press
|
4 |
M. Ohkubo, K. Suzuki, and S. Kinoshita. 'Cryptographic approach to 'privacy-friendly' tags'. In RFID Privacy Workshop, MIT, USA, 2003
|
5 |
M. Hellman. 'A cryptanalytic time-memory trade off'. IEEE Transactions on Information Theory, IT-26(4): 401:406, 1980
|
6 |
이승구, 여상수, 조정직, 김성권, 'RFID 시스템에서 안전하고 효율적인 프라이버시 보호 기법', 한국컴퓨터 종합학술대회, Vol 32, No 1(A), 2005년
|