1 |
Klaus Finkenzeller, ' RFID Handbook', John Wiley & Son, LTD, (1999)
|
2 |
Kyung-Hyup Lee, Yoon-Young An, Hee-Dong Park, You-Ze Cho,' A Data-centric Self-organization Schema for Energy-Efficient Wireless Sensor Networks' (2006) USN (USN 2006 in Seoul)
|
3 |
NIST, 'Announcing the Advanced Encryption Standard (AES)', FIPS-197, Nov. 2001
|
4 |
Daesung kwon, Jaesung Kim, Sangwoo Park, Soohak Sung, Yaekwon Sohn, Junghwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, and Jin Hong, 'New Block Cipher: ARIA,' LNCS 2971 - ICISC2003, pp.432-445, Springer, 2004
|
5 |
A. Clark, E. Dawson, J. Fuller, J. Golic, Hoon-Jae Lee, W.Millan, Sang-Jae Moon, L. Simpson, 'The LILI-II Keystream Generator,' LNCS 2384, pp.25-39, Jul. 2002 (ACISP'2002)
|
6 |
Hoonjae Lee, Sangjae Moon, 'Parallel Stream Cipher for Secure High-Speed Communications,' Signal Processing, Vol.82,No.2,pp.259-265, Feb, 2002
DOI
ScienceOn
|
7 |
KISA, Development of SEED, the 128-bit block cipher standard, Oct, 1998. (http://www.kisa.or.kr)
|
8 |
W. Stalling, Cryptography and Network Security (4th edition), Prentice-Hall, 2006
|
9 |
Sanjay Raghani, Durga Toshniwal and R. C. Joshi, 'Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach', JCIT:Journal of Convergence Information Technology, Vol.2 No.2, pp.10-21, 2007
|
10 |
Jonathan Collins, 'FTC Asks RFID Users to Self- Regulate', RFID Journal, Mar. 10, (2005)
|
11 |
R.C.Joshi and Shashikala Tapaswi, 'Frame Sliced Parallel Signature Files for Fast Colored Image Retrieval', JCIT:Journal of Convergence Information Technology, Vol.2 No.2, pp.5-9, 2007
|
12 |
'FIPA Agent Management Specification,' FIPA 2004 Specification, Foundation for Intelligent Physical Agents, March 2004.
|
13 |
E. Kaasinen, 'User Acceptance of MobileServices- Value. Ease of Use, Trust and Ease of Adoption,' doctoral dissertation, VTT 566, VTT Publication,(2005)
|
14 |
Duck-Yong Yun , 'AVR ATmega128 Master', (2004)
|
15 |
Kevin Chen, M. Henrickson, W.Millan, J. Fuller, A. Simpson, Ed Dawson, Hoonjae Lee, Sangjae Moon, 'Dragon: A Fast Word Based Stream Cipher,' LNCS (ICISC'2004)2004.12.2-12.3
|
16 |
Federal Information Processing Standards (FIPS) Publication 180-1, Secure Hash Standard (SHS), U.S. DoC/NIST, Aug. 1, 2002
|
17 |
Soo-Cheol Kim, Sang-Soo Yeo, Sung Kwon Kim, 'MARP: Mobile Agent for RFID Privacy Protection', 7th Smart Card Research and Advanced Application IFIP Conference (CARDIS '06), Lecture Notes in Computer Science, vol.3928, pp.300-312, April 2006
|
18 |
W. Jansen, T. Karygiannis, 'NIST Special Publication 800-19-Mobile Agent Security,
|
19 |
Vinay Deolalikar, Malena Mesarina, John Recker, Salil Pradon,'Perturbative time and frequency allocations for RFID reader networks' (2006) USN
|
20 |
TTAS.KO-12.0011/R1, 'Hash Funtion Standard - part 2: Hash Function Algorithm Standard (HAS- 160),' Dec. 20, 2002. (http://www.tta.or.kr)
|
21 |
W. Trappe & L. Washington, Introduction to Cryptography with coding theory (2nd edition), Prentice-Hall, 2006
|
22 |
Chipcon Tech. Support, 'User Manual Rev. 2.0', Chip AS, (2004), www.chipcon.com
|
23 |
Hwang-Hae Kyun, Sung-Jun Bae, 'I love ATMEGA128', Bok-Du Verlag, (2005)
|