Browse > Article

4차 산업혁명과 정보보호 기술  

Kim, Ik-Gyun (한국전자통신연구원 정보보호연구본부)
Publication Information
Korea Multimedia Society / v.21, no.3, 2017 , pp. 64-73 More about this Journal
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Leveraging FIDO Standards to Extend the PKI Security Model in United States Government Agencies. FIDO Alliance White Paper, https://fidoalliance.org, 2017
2 E. Bertino, D. Lin, and W. Jiang, "A Survey of Quantification of Privacy Preserving Data Mining Algorithms," In Privacy-Preserving Data Mining: Models and Algorithms, vol.34, pp.183-205, Kluwer Academic Publishers, Jun. 2008.
3 M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers. Format-preserving encryption. Selected Areas in Cryptography - SAC 2009. Lecture Notes in Comput. Sci., vol. 5867, pp. 295-312, 2009
4 D. Sacharidis, K. Mouratidis and D. Papadias, "k-Anonymity in the Presence of External Databases," IEEE Transactions on Knowledge and Data Engineering, 2010.
5 송유진, 박광용, “데이터베이스 아웃소싱을 위한 준동형성 암호기술”, 정보보호학회지, 제19권, 제3호, pp.80-89, 2009.
6 K. Veeramachaneni, I. Arnaldo AI2: training a big data machine to defend IEEE international conference on big data security on Cloud (BigDataSecurity 2016) (2016)
7 https://www.fbi.gov/services/cjis/fingerprints-and-other-biometrics/ngi
8 Meng Zhang, Anand Raghunathan, and Niraj K. Jha. MedMon: Securing medical devices through wireless monitoring and anomaly detection, IEEE Transactions on Biomedical Circuits and Systems
9 Stan Higgins (July 21, 2015). "Inside R3CEV's Plot to Bring Distributed Ledgers to Wall Street“
10 KOTRA, 워싱턴무역관, "미국 사이버보안시장 동향과 우리기업 진출을 위한 시사점", 2016.8