Browse > Article

독일의 eID 동향 및 기술 분석  

Lee, Donghyeok (제주대학교 일반대학원 컴퓨터교육전공)
Park, Namje (제주대학교 일반대학원 컴퓨터교육전공)
Kang, Yousung (한국전자통신연구원 사이버보안연구본부 암호기술연구실)
Choi, Dooho (한국전자통신연구원 사이버보안연구본부 암호기술연구실)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 BSI TR-03130, https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr03130/tr-03130.html
2 BSI, "Innovations for an eID Ar- chitecture in Germany", http://www. bsi.bund.de, 2011.
3 A. Poller, U. Waldmann, S. Vowe, S. Turpe, "Electronic Identity Cards for User Authentication - Promise and Practice", IEEE Security & Privacy, 10(1), pp.46-54, Feb 2012.   DOI
4 H. Zwingelberg, M. Hansen. "Privacy Protection Goals and their implications for eID systems", Privacy and Identity Management for Life, Springer Berlin Heidelberg, 375, pp. 245-260, Sep. 2011.
5 J. Essbach, "An approach to a decentral mobile payment system using nfc and the germaneid-card", Wireless Systems (IDAACS-SWS), IEEE 1st International Symposium on, pp. 67-71, Sep 2012.
6 M. Margraf, "The new german id card." ISSE 2010 Securing Electronic Business Processes. pp. 367-373, Nov. 2010.
7 T. Messerges, E. Dabbish, R. Sloan, "Examining smart-card security under the threat of power analysis attacks", IEEE Transactions on Computers, 51(5), pp. 541-552, May 2002.   DOI
8 B. Zwattendorfer, D. S., "Privacy -preserving realization of the stork framework in the public cloud", Security and Cryptography, 2013 International Conference on. IEEE, pp. 1-8, Jul 2013.
9 C. Cuijpers, J. Schroers. "eIDAS as guideline for the development of a pan European eID framework in FutureID", Open Identity Summit, 237, pp.23-28, Jan 2014.
10 H. Leitold, "Challenges of eID interoperability: The STORK project", Privacy and Identity Management for Life. Springer Berlin Heidelberg, 352, pp.144-150, Aug. 2010.
11 S. Arora, "National e-ID card schemes: A European overview", Information Security Technical Report, 13(2) pp.46-53, 2008.   DOI
12 Volker Reible, Andre Braunmandl. "The eID Function of the nPA within the European STORK Infrastructure.", ISSE 2010 Securing Electronic Business Processes. pp.392-398, 2010.
13 Sebastian Feld, Norbert Pohlmann. "Security analysis of OpenID, followed by a reference implementation of an nPA-based OpenID provider.", ISSE 2010 Securing Electronic Business Processes, pp. 13-25, 2010.