최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털콘텐츠학회 논문지 = Journal of Digital Contents Society, v.17 no.6, 2016년, pp.499 - 507
이상기 (Kyonggi University Computer Science) , 이세윤 (Korea University Law) , 김정출 (Kookmin University Electrical Engineering & Computer Science)
The era of IoT, which figures exchanging data from the internet between things is coming. Recently, former electric power energy policy paradigm, namely Supply side paradigm, is changing, because electric power energy consumption is rapidly increasing. As new paradigm for this limit, convergence of ...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
https://isms.islearning.kr/mik_lib/file_down.php?bf_idx16
https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf
Jin-Young Kim and Sun-Myung Hwang, "Outlook and Challenges of Security System for the Activation of IoT", Korea Computer Congress, Korea Information Science Society, Jeju, 2015, pp. 1037-1039.
http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?curPage1&menu_dist1&seq21742
http://kashi.or.kr/board/index.html?actionview&board_idpds2&seq13032
http://datanet.co.kr/news/articleView.html?idxno69944
http://www.washingtonpost.com/wp-dyn/content/article/2008/06/05/AR2008060501858.html
http://online.wsj.com/article/SB123914805204099085.html
J. Daemen, V. Rijmen, "AES proposal: Rijndael", NISTAES Proposal, 1998, pp. 1-45.
NIST, "FIPS PUB 46-3 Data Encryption Standard (DES)", Federal Information Processing Standards Publications, 1999, pp. 1-22.
NIST, "FIPS PUB 180-4 Secure Hash Standard", Federal Information Processing Standards Publications, 2012, pp. 1-39.
IETF, "RFC-1321 The MD5 Message-Digest Algorithm", Network Working Group, 1992, pp. 1-22.
G. Bertoni, J. Daemen, M. Peeters and G. Van Assche, "The Keccak reference", round 3 submission to NIST SHA-3, 2011, pp. 1-69.
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, Vol.21, No. 2, 1978, pp. 120-126.
ITU-T, "Framework of Web of Things", Inernational Telecommunication Union, 2012, pp. 1-22.
A. Bogdanov, L. R. Knudsen, G. Le, C. Paar, A.Poschmann, M. J. B. Robshaw, Y. Seurin, and C.Vikkelsoe, "Present: An ultra-lightweight block cipher", In Proceedings of the International Conferenceon Cryptographic Hardware and Embedded Systems(CHES07), Vol. 4727, 2007, pp. 405-466.
C. Canniere, O. Dunkelman, M. Knezevic, Katan, and Ktantan, "A family of small and efficient hardware-oriented block ciphers", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 09), Vol. 5747, 2009, pp.272-288.
D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm", In Proceedings of the 7th International Conference on RFID Security and Privacy(RFIDSec'11), Vol. 7055, 2011, pp. 19-31.
D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B.Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim,J. Kim, and S. Chee, "Hight: a new block cipher suitable for low-resource device", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 06), Vol. 4269, 2006, pp. 46-59.
J. Guo, T. Peyrin, and A. Poschmann, "The photon family of lightweight hash functions", in Crypto2011, Lncs, Vol. 6841, 2011, pp. 222-239.
A. Bogdanov, M. Knezevic, G. Leander, D. Toz,K. Varici, I. Verbauwhede, and Spongent: "The design space of lightweight cryptographic hashing", http://sites.google.com/site/spongenthash, 2012.
Donghee Kim, Seokung Yoon, Yongpil Lee, "Security for the IoT Service", The Korean Institute of Communications and Information Sciences, Vol.30, No.8, 2013, pp.53-59.
http://www.zigbee.org
http://www.wi-fi.org
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.