1 |
H. Kim, I. Lee, "A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack", Jr. of the Korea Institute of Information Security & Cryptology, Vol.24, No.5, pp.769-780, 2014. DOI: https://doi.org/10.13089/JKIISC.2014.24.5.769
|
2 |
Security Technology Research Team, Comparison of Changes and Characteristics of Identity Information Management Types, Security Research Department, Financial Security Agency, Korea, pp.1-6, 2017.
|
3 |
BSI, Common Criteria Protection Profile-Machine Readable Travel Document with ICAO Application, Extended Access Control with PACE(EAC pp), BSI-PP-0017, Version1.3.0, 20th January 2012.
|
4 |
Gaurav S.,Kcand Paul A.,Karger, Security and privacy issues in machine readable travel documents(MRTDs), IBM Technical Report(RC 23575), IBM T.J, Watson Research Labs, Apr 2005.
|
5 |
BSI, Advanced Security Mechanisms Machine Readable Travel Documents - Extended Access Control(EAC), Version 2.05, TR-03110, 2010.
|
6 |
NIST. "FIPS Publication186-1:Digital Signature Standard(DS-S)", November 2008.
|
7 |
G. W. Kuk, Application Cases by Blockchain Technology and Industry Sectors, Weekly ICT Trends, Institute of Information & Communications Technology Planning & Evaluation, Vol.1900, pp.13-27, 2019.
|
8 |
Y. J. Lee, Taeyeol Jeon.. "An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server", Journal of the Korea Academia-Industrial, Vol.20, No.6, pp.1-8. 2019. DOI: https://doi.org/10.5762/KAIS.2019.20.6.1
|
9 |
J. H. Jang, S. H. Song, S. T. Kim, "A Survey on Blockchain Platforms for Supply Chain Management", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.18, No.5, pp.259-265, 2019. DOI: https://doi.org/10.7236/JIIBC.2018.18.5.259
DOI
|
10 |
J. C. Park, "A Secure Single Sign-On Scheme across Multiple Allied Websites using Smartphones". Journal of Security Engineering, Vol.14, No.3, pp. 189-204, 2017. DOI: http://dx.doi.org/10.14257/jse.2017.06.01
DOI
|
11 |
Y. Choi, H. Kwon, "A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information", Journal of the Korea Institute of Information Security & Cryptology, Vol.28, No.6, pp.1607-1621, 2018. DOI: https://doi.org/10.13089/JKIISC.2018.28.6.1607
DOI
|
12 |
S. J. Han, S. T. Kim, S. Y. park, "A GDPR based Approach to Enhancing Blockchain Privacy", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.19, No.5, pp.33-38, 2019. DOI: https://doi.org/10.7236/JIIBC.2019.19.5.33
|
13 |
S. G. Moon, M. S. Kim, H. J. Kim, "Design of an Integrated University Information Service Model Based on Block Chain", Journal of the Korea Academia-Industrial cooperation Society Vol. 20, No. 2 pp. 43-50, 2019. DOI: https://doi.org/10.5762/KAIS.2019.20.2.43
DOI
|
14 |
M. J. Cho, C. H. Lee, "Access Control Mechanism for Industrial Control System Based Smart Contract", Journal of The Korea Institute of Information Securty & Cryptology, Vol.29, No.3, pp.579-588, 2019. DOI: https://doi.org/10.13089/JKIISC.2019.29.3.579
|
15 |
S. D. Yoo, "A Study on Consensus Algorithm based on Blockchain", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.19, No.3, pp.25-32, 2019. DOI: https://doi.org/10.7236/JIIBC.2019.19.3.25
DOI
|
16 |
J. K. Lee, J. G. Son, H. M. Kim, H. K. Oh, "An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment", Journal of The Korea Institute of Information Security & Cryptology, Vol.23, No.6, pp.1131-1141, Dec 2013. DOI: https://doi.org/10.13089/JKIISC.2013.23.6.1131
DOI
|