1 |
이영석, 유용덕, 박상현, 최훈, "웨어러블 컴퓨팅 보안", 한국차세대컴퓨팅학회논문지, Vol 2., No. 2, pp. 23-31, 2006. 6
|
2 |
Y. W. Law and J. M. Doumen and P. H. Hartel, "Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract)", 1st IEEE Int. Conf. on Mobile Ad-Hoc and Sensor Systems(MASS 2004), Fort Lauderdale, Florida, Oct. 2004
|
3 |
유용덕, 최훈, 김형신, 권영미, Takeshi Nanri "경량 미들웨어를 위한 소프트웨어 구조", 한국차세대PC학회 논문지, Vol.1 No.2, pp.34-42, 2005. 12
|
4 |
PKCS #11: Cryptographic Token Interface Standard v2.20, Rsa Labs
|
5 |
D. Eastlake, P. Jones, "US Secure Hash Algorithm 1(SHA1)", RFC 3174, Sep. 2001
|
6 |
R. Baldwin, R. Rivest "The RC5, RC5-CBC, RC5- CBC-Pad, and RC5-CTS Algorithms", RFC 2040, Oct. 1996
|