1 |
J. Lee, "Applications and Problems of Authentication Certificate in Smart Environment", Internet & Security Focus, pp. 23-53, Mar. 2013.
|
2 |
Y. Jung, S. Lee, H. Oh, and T. Jeon, "Research on the Influence of Absorbing Sheet for Electrical Performance of NFC Antenna", Journal of IKEEE, vol. 16, no. 3, pp. 167-172, Sep. 2013.
DOI
|
3 |
ITU-T Recommendation X.509, "Information Technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks", 2012.
|
4 |
OASIS PKCS#11, "Cryptographic Token Interface Base Specification, Interface Profiles, Current Mechanisms Specification, and Historical Mechanisms Specification", 2014.
|
5 |
IETF RFC 4683, "Internet X.509 Public Key Infrastructure Subject Identification Method", 2006.
|
6 |
B. Kim and I. Shin, "Implementation of Authentication Algorithm for CDMA Digital Mobile Communication System", Journal of IKEEE, vol. 3, no. 2, pp. 204-214, Dec. 1999.
|