1 |
Jegalbyungjik. "Trend of Mobile OS and Smart Phone Market," Semiconductor Insight 36, 2010.
|
2 |
Kiyoung Kim, and Dongho Kang. "Smartphone Security for Open Mobile Environments," KIISC 19, no. 5, pp. 21-28, 2009.
|
3 |
Korea Communications Commission, KISA, "Survey on Security of Current Trend of Public in 2012," 2012.
|
4 |
Gary C. Kessler, "PASSWORDS - STRENGTHS AND WEAKNESSES," available at http://www.garykessler.net/ library/password.html
|
5 |
Rydell, Johan, Mingliang Pei, and Salah Machani. "TOTP: Time-Based One-Time Password Algorithm." 2011.
|
6 |
Daemen, Joan, and Vincent Rijmen. "AES proposal: Rijndael," 1999.
|
7 |
Sidorenko, Andrey, and Berry Schoenmakers. "Concrete security of the Blum-Blum-Shub pseudorandom generator." In Cryptography and Coding, pp. 355-375, 2005.
|
8 |
Gjosteen, Kristian. "Comments on Dual-EC-DRBG/NIST SP 800-90," 2006.
|
9 |
Ruhrmair, Ulrich, and Marten van Dijk. "Practical security analysis of PUF-based two-player protocols." In Cryptographic Hardware and Embedded Systems, pp. 251-267. 2012.
|
10 |
Goldwasser, Shafi, Silvio Micali, and Charles Rackoff. "The knowledge complexity of interactive proof systems." SIAM Journal on computing 18, no. 1, pp. 186-208, 1989.
DOI
ScienceOn
|
11 |
Changyoung Kwan, Hyunggyu Yang, Dongho Won, "Research on Zero-knowledge for Applications and Communication Verification," KIISC 2, no. 2, pp. 31-39, 1992.
|
12 |
Wikipedia,"Zero-knowledge proof," available at http://en.wikipedia.org/wiki/Zero-knowledge_proof
|
13 |
"How secure is my password?," Available at https://howsecureismypassword.net
|
14 |
EBench, "eBACS: ECRYPT Benchmarking of Cryptographic Systems," Available at http://bench.cr.yp.to/resultsstream. html
|