Browse > Article

분산 스마트 카메라 시스템 보안 이슈  

Ryu, Dae-Hyun (한세대학교 IT학부)
Han, Jong-Wook (한국전자통신연구원 융합서비스보안연구팀)
Cho, Hyun-Sook (한국전자통신연구원 지식정보보안연구부)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, 2002.
2 A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, no. 6, 2004.
3 R. Watro et al., "TinyPK: Securing sensor networks with public key technology," in Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., Washington, DC, Oct. 25, 2004.
4 H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. 2003 Symp. Security Privacy, Oakland, CA, May 11-14, 2003.
5 S. Slijepcevic et al., "On communication security in wireless ad-hoc sensor networks," in Proc. IEEE 11th Int. Workshop Enabling Technol.: Infrastruct. Collab. Enterprises (WET ICE 2002),
6 J. Deng, R. Han, and S. Mishra, "Security support for in-network processing in wireless sensor networks," in Proc. 1st ACM Workshop Security Ad Hoc Sensor Netw., Fairfax, VA, 2003
7 P. Ganesan et al., "Analyzing and modeling encryption overhead for sensor network nodes," in Proc. 2nd ACM Int. Conf. Wireless Sensor Netw. Applicat., San Diego, CA, Sep. 19, 2003.
8 S. Ravi, A. Raghunathan, and S. Chakradhar, "Tamper resistance mechanisms for secure embedded systems, in Proc. 17th Int. Conf. VLSI Design 2004, Mumbai, India, 2004.
9 E. English and S. Hamilton, "Network security under siege: The timing attack," Computer, vol. 29, no. 3, 1996.
10 H. Broers et al., "Architecture study for smart cameras," in Proc. EOS Conf. Ind. Imag. Mach. Vision, Munich, Germany, 2005.
11 N. Reijers and K. Langendoen, "Efficient code distribution in wireless sensor networks," in Proc. 2nd ACM Int. Conf. Wireless Sensor Netw. Applicat., San Diego, CA, 2003.
12 A. D. Rubin and D. E. Geer, Jr, "Mobile code security," IEEE Internet Comput., vol. 2, no. 6, Dec. 1998.
13 H. Chan and A. Perrig, "Security and privacy in sensor networks," Computer, vol. 36, no. 10, 2003.
14 A. Hampapur et al., "Smart surveillance: Applications, technologies and implications," in Proc. 2003 Joint Conf. 4th Int. Conf. Inf., Commun. and Signal Process. 2003 and 4th Pacific Rim Conf. Multimedia, vol. 2, Dec. 15-18, 2003.
15 유장희, 문기영, 조현숙, "지능형 영상보안 기술현황 및 동향", 전자통신동향분석 제 23권 제 4호 2008 년 8월
16 A. Chattopadhyay and T. E. Boult, "PrivacyCam: A privacy preserving camera using uCLinux on the Blackfin DSP," in Proc. IEEE Conf. Computer Vision Pattern Recognition (CVPR''07), Minneapolis, MN, Jun. 2007.
17 F. Hartung and F. Ramme, "Digital rights management and watermarking of multimedia content for m-commerce applications," IEEE Commun. Mag., vol. 38, no. 11, Nov. 2000.
18 Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surv., vol. 8R 2nd quarter, 2006.
19 유기영외, "CCTV 기반 얼굴검출 및 인식 시스템 보안 프레임워크에 관한 연구", 한국인터넷진흥원, 2009.7
20 서현수 외, "분산 스마트 카메라의 보안에 관한 연 구", 제5회 한국사이버테러정보전학회 춘계학술발 표대회, 2010.05
21 나동호 외, "분산 스마트 카메라 플랫폼의 설계 및 구현", 제9회 한국인터넷방송통신학회 춘계학술발 표대회, 2010.05
22 Rinner and Wolf, "An Introduction to Distributed Smart Cameras", Proceedings of the IEEE, Vol. 96, No. 10, October 2008
23 Serpanos and Papalambrou,"Security and Privacy in Distributed Smart Cameras", Proceedings of the IEEE, Vol. 96, No. 10, October 2008
24 W. Wolf, B. Ozer, and T. Lv, "Smart cameras as embedded systems," Computer, vol. 35, no. 9, 2002.
25 M. Bramberger, B. Rinner, and H. Schwabach, "An embedded smart camera on a scalable heterogeneous multi-DSP system," in Proc. Europ. DSP Educ. Res. Symp. (EDERS 2004), Birmingham, U.K., Nov. 2004.