1 |
J. Dean and S. Ghemawat, "MapReduce: Simplified data processing on large clusters," Communications of the ACM, Vol.51, Issue.1, pp.107-113, 2008.
DOI
|
2 |
Hadoop [Internet], http://hadoop.apache.org.
|
3 |
S. Narayanan, "Securing Hadoop : Implement robust end-to-end security for your Hadoop ecosystem," 1st Vol, PACKT Publishing, 2014.
|
4 |
So Hyeon Park and Ik Rae Jeong, "A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos," Journal of the Korea Institute of Information Security and Cryptology, Vol.23, Issue.5, pp.803-813, 2013.
DOI
|
5 |
Liu Yi, Hadoop Crypto Design [Internet], https://issues.apache.org/jira/secure/attachment/12571116/HadoopCryptoDesign.pdf.
|
6 |
Seonyoung Park and Youngseok Lee, "A Performance Analysis of Encryption in HDFS," Journal of KISS : Databases, Vol.41, Issue.1, pp.21-27, 2014.
|
7 |
Byeong-yoon Choi. "Design of Cryptographic Processor for AES Rijndael Algorithm," The Journal of The Korean Institute of Communication Sciences, Vol.26, Issue.10, pp. 1491-1500, 2001.
|
8 |
Yong Kuk Cho, Jung Hwan Song, and Sung Woo Kang, "Criteria for Evaluating Cryptographic Algorithms based on Statistical Testing of Randomness," Journal of the Korea Institute of Information Security and Cryptology, Vol.11, Issue.6, pp.67-76, 2001.
|
9 |
ARIA Development Team, Block Encryption Algorithm ARIA [Internet], http://glukjeoluk.tistory.com/attachment/ok110000000002.pdf.
|
10 |
Korea Internet & Security Agency, 민관겸용 블록 암호 알고리즘 ARIA 알고리즘 명세서 [Internet], http://seed.kisa.or.kr/iwt/ko/bbs/EgovReferenceDetail.do?bbsId=BBSMSTR_000000000002&nttId=39&pageIndex=1&searchCnd=&searchWrd=.
|
11 |
Jeffrey Root, Intel Advanced Encryption Standard Instructions(AES-NI), https://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.
|