Secret Information Protection Scheme for Device in Home Network |
Maeng, Young-Jae
(인하대학교 정보통신대학원)
Kang, Jeon-Il (인하대학교 정보통신대학원) Mohaisen, Abedelaziz (인하대학교 정보통신대학원) Lee, Kyung-Hee (수원대학교 전자공학과) Nyang, Dae-Hun (인하대학교 정보통신대학원) |
1 | Ron Rivest, Adi Shamir and Len Adleman, 'A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,' Communications of the ACM, Vol. 21 (2), pp. 120-126. 1978 DOI ScienceOn |
2 | Arvind Seshadri, Adrian Perrig, Leendert van Doorn, and Pradeep Khosla, 'SWATT: SoftWare-based ATTestation for Embedded Devices,' In Proceedings of the IEEE Symposium on Security and Privacy, pp. 272-281, May 2004 DOI |
3 | https://www.trustedcomputinggroup.org/groups/tpm/ |
4 | Whitfield Diffie, Martin Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, IT-22(6), pp. 644-654, November 1976 |
5 | Gura N., Patel A., Wander A., Eberle A., Shantz S. C, 'Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs', CHES 2004, pp. 119-132, 2004 |
6 | Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep Khosla, 'Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems,' In Proceedings of the 20th ACM symposium on Operating Systems Principles, pp. 1-16, 2005 |
7 | Adi Shamir, 'How to share the secret,' Communications of the ACM, Vol 22, Issue 11 (November 1979), pp. 612-613, 1979 DOI ScienceOn |
8 | M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim, 'Remote Software-Based Attestation for Wireless Sensors,' In ESAS 2005, LNCS 3813, pp. 27-41, 2005 DOI ScienceOn |
9 | Y. Desmedt, Y. Frankel, 'Threshold cryptosystems,' Advances in Cryptology - Crypto '89, LNCS 435, pp. 307-315, 1990 DOI |