1 |
R.Kazman, M.Klein, M.Barbacci, H.Lipson, T.Longstaff, and S. J. Carriere, 'The Architecture Tradeoff Analysis Method,' Proc. Fourth Int'l Conf. Eng. Of Complex Computer Systems (ICECCS '98), pp.68-78, Aug., 1998
DOI
|
2 |
Len Bass, Paul Clements, Rick Kazman, Software Architecture in Practice, Addison Wesley, 2003
|
3 |
Lilianan Dobrica, Eila Niemela, 'A Survey on Software Architecture Analysis Methods,' IEEE Transactions on Software Engineering, Vol.28, No.7, pp.638-653, July, 2002
DOI
ScienceOn
|
4 |
Ollivier, M.M., 'RFID-a new solution technology for security problems,' Security and Detection, European Convention on,16-18 May, 1995, Page(s) : 234-238, 1995
|
5 |
www.winzip.com, 'Secure your documents with 128- or 256- bit AES encryption,' http://www.winzip.com/powertips.htm#encrypt
|
6 |
R. Rivest, 'The Message-Digest Algorithm,' IETF RFC 1321, http://www.ietf.org/rfc/rfc1321.txt?number=1321, 1992
|
7 |
Inside Technology, 'M210-2G Proximity Coupler,' http://www.insidecontactless.com/pdf/M210_2G.PDF
|
8 |
Inside Technology, 'PicoTagTM: ISO 15693 Memory Chips,' http://www.insidecontactless.com/pdf/PicoTag.pdf
|
9 |
Sangani, K., 'RFID sees all,' IEE Review, Volume 50, Issue 4, April, 2004, Page(s) : 22-24, 2004
DOI
ScienceOn
|
10 |
IDC, 'IDC, Worldwide Flash Memory Card and USB Flash Drive Forecast and Analysis, 2003-2007'
|
11 |
Microsoft Office Online, 'Protect a document from unauthorized changes,' http://office.microsoft.com/en-us/assistance/HP010446741033.aspx
|
12 |
김광조, 'RFID/USN 정보보호 기술,' TTA Journal, 2004
과학기술학회마을
|
13 |
Weis, S.A, 'RFID Privacy Workshop,' Security & Privacy Magazine, IEEE, Volume 2, Issue 2, Mar-Apr 2004 Page(s): 48-50, 2004
DOI
ScienceOn
|
14 |
Want, R, 'Enabling ubiquitous sensing with RFID,' Computer Volume 37, Issue 4, April, 2004, Page(s): 84-86, 2004
DOI
ScienceOn
|
15 |
권수갑, 'RFID 개념과 동향,' 한국전자부품연구원, 2004
|
16 |
CSI (Computer Security Institute), '2004 CSI/FBI Computer Crime and Security Survey,' http//www.GoCSI.com, 2004
|
17 |
Steven Shepard, 'RFID(McGraw-Hill Networking Professional),' McGraw-Hill, 2004
|
18 |
표철식, 채종석, 'RFID 기술 및 표준화 동향,' TTA Journal, 2004
과학기술학회마을
|
19 |
한국 인터넷 침해 사고 대응 지원 센터, '2003년 12월 해킹바이러스 통계 및 분석월보,' http//www.krcert.or.kr, 2003
|
20 |
한국 인터넷 침해 사고 대응 지원 센터, '2002년 12월 해킹 통계 보고서,' http//www.krcert.or.kr, 2002
|