1 |
Kyeoung-Ju Ha., Chang-Ho Seo, Dae-Youb Kim, "Design of Validation System for a Crypto-Algorithm Implementation", The Journal of Korea Information and Communications Society, 39(B), pp. 242-250, Apr. 2014
|
2 |
Jianying Zhou and Dieter Gollmann, "Evidence and Non-repudiation," Journal of Network and Computer Applications, Vol. 20, No. 3, pp. 267-281, Jul. 1997
DOI
|
3 |
Dong-Ho Won and Young-Suk Lee, Ji-Yeon Kim, "Understanding Cryptography, A Textbook for Students and Practitioners", Greenpress, pp. 37-41, Feb. 2016
|
4 |
Mi-Ji Sung and Kyung-Wook Shin,"An Efficient Hardware Implementation of Lightweight Block CipherLEA-128/192/256 for IoT Security Applications", J. Korea Inst. Inf. Commun. Eng. Vol. 19, No. 7,pp 1608-1616, Jul. 2015
DOI
|
5 |
Ministry of Science,ICT and Future Planning, "Roadmap of IoT Information Security ", p 68, Oct. 2014
|
6 |
Je-Seong Jeong, Kyung-min Kim, HakJu Kim,Joon-jeong Park, Soo-Hyun, Ahn, Dongsoo Lee,Rakyong Choi, Kwangjo Kim,Daeyoung Kim, Shin,"Configuration of IoT Secure SNAIL Platform Using Lightweight Crypto primitives (I)", CISC-W'14, v.0, Dec. 2014
|
7 |
When encrypting personal information of large capacity OLTP system System Performance Improvement Plan (Focused on Public A System), INNOVATION STUDIES, Vol. 9, No. 1, pp. 115-118, Jun. 2014
|
8 |
Kyuwoon Kim and Hyunwoo Kim and Huijeong Kim and Taeyoung Huh and Sanghyuk Jung, and Yong Ho SongAn "Analytical Model for Performance Prediction of AES on GPU Architecture", Journal of The Institute of Electronics Engineers of Korea Vol. 50, NO. 4, pp. 852-854, April 2013
|
9 |
Jang-Hyun Kim, Hyo-Joong Suh, "Implementation of Verification and Evaluation Testbed of WiMax2 PKMv2 Encryption Layer", The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 15 No.1, pp.80-81. Feb. 2015
|