1 |
Y.H. Kwon, "5th generation Bluetooth technology for wearable devices," Institute of Information & communications Technology Planning & Evaluation, Weekly ICT Trend, vol. 1961, Aug. 2020
|
2 |
Korea Certification Authority Central, https://www.rootca.or.kr/, Korea Internet & Security Agency, Accessed : June 2021
|
3 |
John Padgette, John Bahr, Mayank Batra, Marcel Holtmann, Rhonda Smithbey, Lily Chen, Karen Scarfone, " Guide to Bluetooth Security," National Institute of Standards and Technology, Special Publication 800-121, May 2017
|
4 |
Gil Bernabeu, "TPM & TEE - working together in harmony," https://globalplatform.org/tpm-tee-working-together-in-harmony/, Accessed : June 2021
|
5 |
Hee-won Shim, "Domestic and overseas trends and implications of decentralized ID technology," Korea Financial Telecommunications & Clearings Institute, no. 73, Dec. 2019
|
6 |
Manu Sporny, Dave Longley and David Chadwick, "Verifiable credentials data model 1.0," W3C Recommendation, Nov. 2019
|
7 |
Drummond Reed, Manu Sporny, Dave Longle, Christopher Allen, Ryan Grant, Markus Sabadello, "Decentralized Identifiers (DIDs) v1.0," W3C Recommedation Draft, June 2021
|
8 |
Korea Policy Briefing, "Pilot implementation of mobile driver's license from year-end ...Nationwide expansion next year," https://www.korea.kr/special/policyFocusView.do?newsId=148886928&pkgId=49500747, Accessed : May 2021
|
9 |
Oskar Deventer, Christian Lundkvist, Marton Csernai, Kyle Den Hartog, Markus Sabadello, Sam Curren, Dan Gisolfi, Mike Varley, Sven Hammann, John Jordan, Lovesh Harchandani, Devin Fisher, Tobias Looker, Brent Zundel, Stephen Curran, "Peer DID Method Specification," W3C, April 2021
|
10 |
Core Specification Working Group, "Bluetooth Core Specification," Bluetooth Special Interest Group, v5.2, Dec. 2019
|
11 |
Kai Ren, "Bluetooth Pairing Part 4: Bluetooth Low Energy Secure Connections -Numeric Comparison," Bluetooth Blog, https://www.bluetooth.com/blog/bluetooth-pairing-part-4/, Accessed : June 2021
|
12 |
"[Forum] Inoculation certificate, mutual recognition between countries is urgently needed," THE DIGITAL TIMES, http://www.dt.co.kr/contents.html?article_no=2021052802102369073001, Accessed : May 2021
|
13 |
Ryan West, Daniel Bluhm, Matthew Hailstone, Stephen Curran, Sam Curren, Stephen Curran, George Aristy, "Aries RFC 0023: DID Exchange Protocol 1.0," https://github.com/hyperledger/aries-rfcs/tree/master/features/0023-did-exchange, Accessed : May 2021
|
14 |
HyoKwan Kang, "Status of domestic authentication technology and service," Korea Institute of Information Security and Cryptology, vol. 30, no. 3, pp. 31-36, June 2020
|
15 |
Trusted Computing Group, "TPM 2.0 Mobile Reference Architecture," TCG specification, Dec. 2014
|
16 |
Personal Information Protection Commission, "Enforcement Decree of the Personal Information Protection Act, Article 19," National Law Information Center, Ministry of Legislation, Presidential Decree No. 31429, Feb. 2021
|
17 |
Korea Disease Control and Prevention Agency, "Act on the Prevention and Management of Infectious Diseases, Article 49," National Law Information Center, Law no. 17920, Mar. 2021
|
18 |
Security Technology Research Team, "The concept and overseas technology trend of decentralized ID," e-Finance and Financial Security no. 16, pp. 15-39, Financial Security Institute, April 2019
|
19 |
DaeGeun Yoon, Self-sovereign identity verification structure analysis, Jpub, July 2020
|
20 |
SSImeetup Identity Webinar, "Peer DIDs: a secure and scalable method for DIDs that's entirely off-ledger," https://ssimeetup.org/peer-dids-secure-scalable-method-dids-off-ledger-daniel-hardman-webinar-42, Accessed : May 2021
|
21 |
S.H. Kim, Y.K. Lee, B.H. Chung, "Analysis on Trends for White-Box Cryptography and Its Application Technology," Electronics and Telecommunications Research Institute, Electronics and Telecommunications Trends Analisys, vol. 25, no. 5, Oct. 2010
|
22 |
Joshua M Franklin, Christopher Brown, Spike Dog, Neil McNab, Sharon Voss-Northrop, Michael Peck, Bart Stidham, "Assessing Threats to Mobile Devices & Infrastructure," National Institute of Standards and Technology, Interagency Report 8144, Sep. 2016
|
23 |
Seon-Joo Kim, "Secure Management Method for Private Key using Smartphon's Information," The Korea Contents Association vol. 16, no. 8, pp. 90-96, Aug. 2016
DOI
|
24 |
Computer World, "[Focus] Abolition of monopoly status of accredited certificates, Private authentication market opens," https://www.comworld.co.kr/news/articleView.html?idxno=49867, Accessed : June 2021
|
25 |
MSIT release, "December 10, Abolition of the Accredited Electronic Signature system," Ministry of Science and ICT, Dec. 2020
|
26 |
Kanghyo Lee, "The need for DID-based mobile ID for the post-corona era," Korean Internet & Security Agency, KISA Report, vol.10, 2020
|
27 |
Joint of Relevant Ministries, "Blockchain technology diffusion strategy," Ministry of Science and ICT, June 2020
|