1 |
H. Lee, "Smart home based internet of thing," The Journal of the Korean Institute of Communication Sciences, Vol. 32, No.4, pp.44-49, 2015.
|
2 |
Kyungsu Park, Jieun Eom, Jeongsu Park, and Donghoon Lee, "Secure and Efficient Client-side Deduplication for Cloud Storage," Journal of the Korea Institute of Information Security & Crytology, Vol.25, No.1, pp.83-94, 2015.
DOI
|
3 |
Jaehoon Kim and Hojin Seo, "Vulnerability Analysis of Authentication in Encryption Key Backup Using Personal Cloud Storage : Focus on Case Studies," Journal of Korean Institute of Information Technology, Vol.15, No.5, pp.121-129, 2016.
|
4 |
H. Kwon, D. Jeong, B. Jeong, and J. Kim, "Cloud security overview," The Journal of The Korean Institute of Communication Sciences, Vol.32, No.10, pp.71-76, 2015.
|
5 |
E. S. Jeong, B. H. Kim, and D. H. Lee, "A generic partial encryption scheme for low-power mobile devices," MultiMedia Tools and Applications, Vol.72, pp.2087-2106, 2014.
DOI
|
6 |
A. Moumen, M. Bouye, and H. Sissaoui, "New secure partial encryption method for medical images," Nonlinear Dynamics, Vol.82, pp.1475-1482, 2015.
DOI
|
7 |
H. Kim and S. Hwang, "A Study on Application of Efficient Partial Encryption Technique on USB Memory," The Institute of Electronics Engineers of Korea Fall Conference, pp.632- 635, 2009.
|
8 |
K. Kim and S. Nam, "Partial encryption algorithm based on block cipher algorithm," Proceedings of the 33th KSII Spring Conference, pp.119-120, 2016.
|
9 |
D. Hong, J. K. Lee, D. C. Kim, D. Kwon, K. H. Ryu, and D. G. Lee, "LEA : A 128-Bit Block Cipher for Fast Encryption on Common Processors," WISA 2013: Information Security Applications, pp.3-27, 2014.
|
10 |
J. Deamen and V. Rijmen, "Advanced Encryption Standard (AES)," Federal Information Processing Standards Publication, 197, 2001.
|
11 |
D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. S. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "HIGHT : A New Block Cipher Suitable for Low-Resource Device," Cryptographic Hardware and Embedded Systems, pp.49-59, 2006.
|
12 |
KISA [Internet], https://seed.kisa.or.kr/.
|
13 |
SeongMin Cho and Hoon Lee, "A Countermeasure against the Abatement Attack to the Security Server," Journal of the Korea Institute of Information and Communication Engineering, Vol.20, No.1, pp.94-102, 2016.
DOI
|
14 |
S. Moon, M. Kim, and T. Kwon, "Lightweight cryptographic technology trends for IoT communication environment," The Journal of The Korean Institute of Communication Sciences, Vol.33, No.3, pp.80-86, 2016.
|