1 |
Tsujii, S., Itakura, Y., Yamaguchi, H., Kituzawa, A., Saito. S., Kasa-hara, M., A public key encryption method having a structure in which biological information is embedded in a secret key, Technical Report of IEICE, SCIS 2000, D07, 2000
|
2 |
http://www.itl.nist.gov/fipspubs/fipl80-1.htm
|
3 |
http://www.e-smartcom.net/product/produet-smartcard eCOS%20CARD.htm
|
4 |
http://members.tripod.Iycos.co.kr/temafu/postal/RFID-1_ 2.htm
|
5 |
P. Gutmann, 'Software Generation of Practically Strong Random Numbers, extended version,' available at http://www.cryptoengines.com/peter/06random.pdf, june, 2000
|
6 |
3GPP TSG SA WG3 Security-S3 # 15, 'Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms,' Sep., 2000
|
7 |
3GPP TS 35.201 ; F8 and F9 Algorithms Specification ; this is available at http://www.etsi.org/dvbandca/3gpp/3gppspecs.htm
|
8 |
B. E. Jung, H. Ryu, K. Kim, K. Y. Chang and O. Y Yi, 'Analysis and Implementation for 3GPP Authentication Mechanism,' Proceeding of WISA, pp.87-102, 2001
|
9 |
http://csrc.nist.gov/CryptoToolkit/aes
|
10 |
송정환,현진수, 구본욱, 장구영, '블록 암호 알고리즘 기반의사난수 발생기 제안과 안전성 분석', 정보처리학회논문지C, 제9-C권 제6호, 2002
과학기술학회마을
DOI
|
11 |
Yukio Itakura, Masaki Hashiyada, Toshio nagashima, Shigeo Tsujii, 'Proposal on personal identifiers generated from the STR information of DNA,' Int. Journal Information Security, pp.149-160, April, 2002
DOI
|
12 |
http://www.kisa.or.kr
|
13 |
CSI/FBI Computer Crime & Security Survey Report, 2000
|
14 |
CSI/FBI Computer Crime & Security Survey Report, 1998
|
15 |
Itakura, Y., Nagashima, T., Tsujii, S., Statistical verification of DNA information for personal identification, Information Processing Society of Japan. CSS 2000, pp. 121-126. 2000
|
16 |
Brown TA(2000) Genome, trans. Muramatsu M. Medical Science International, p.154
|