참고문헌
- 유기영외, "CCTV 기반 얼굴검출 및 인식 시스템 보안 프레임워크에 관한 연구", 한국인터넷진흥원, 2009.7
- 유장희, 문기영, 조현숙, "지능형 영상보안 기술현황 및 동향", 전자통신동향분석 제 23권 제 4호 2008 년 8월
- 서현수 외, "분산 스마트 카메라의 보안에 관한 연 구", 제5회 한국사이버테러정보전학회 춘계학술발 표대회, 2010.05
- 나동호 외, "분산 스마트 카메라 플랫폼의 설계 및 구현", 제9회 한국인터넷방송통신학회 춘계학술발 표대회, 2010.05
- Rinner and Wolf, "An Introduction to Distributed Smart Cameras", Proceedings of the IEEE, Vol. 96, No. 10, October 2008
- Serpanos and Papalambrou,"Security and Privacy in Distributed Smart Cameras", Proceedings of the IEEE, Vol. 96, No. 10, October 2008
- W. Wolf, B. Ozer, and T. Lv, "Smart cameras as embedded systems," Computer, vol. 35, no. 9, 2002.
- M. Bramberger, B. Rinner, and H. Schwabach, "An embedded smart camera on a scalable heterogeneous multi-DSP system," in Proc. Europ. DSP Educ. Res. Symp. (EDERS 2004), Birmingham, U.K., Nov. 2004.
- S. Ravi, A. Raghunathan, and S. Chakradhar, "Tamper resistance mechanisms for secure embedded systems, in Proc. 17th Int. Conf. VLSI Design 2004, Mumbai, India, 2004.
- E. English and S. Hamilton, "Network security under siege: The timing attack," Computer, vol. 29, no. 3, 1996.
- H. Broers et al., "Architecture study for smart cameras," in Proc. EOS Conf. Ind. Imag. Mach. Vision, Munich, Germany, 2005.
- N. Reijers and K. Langendoen, "Efficient code distribution in wireless sensor networks," in Proc. 2nd ACM Int. Conf. Wireless Sensor Netw. Applicat., San Diego, CA, 2003.
- A. D. Rubin and D. E. Geer, Jr, "Mobile code security," IEEE Internet Comput., vol. 2, no. 6, Dec. 1998.
- H. Chan and A. Perrig, "Security and privacy in sensor networks," Computer, vol. 36, no. 10, 2003.
- A. Hampapur et al., "Smart surveillance: Applications, technologies and implications," in Proc. 2003 Joint Conf. 4th Int. Conf. Inf., Commun. and Signal Process. 2003 and 4th Pacific Rim Conf. Multimedia, vol. 2, Dec. 15-18, 2003.
- A. Chattopadhyay and T. E. Boult, "PrivacyCam: A privacy preserving camera using uCLinux on the Blackfin DSP," in Proc. IEEE Conf. Computer Vision Pattern Recognition (CVPR''07), Minneapolis, MN, Jun. 2007.
- F. Hartung and F. Ramme, "Digital rights management and watermarking of multimedia content for m-commerce applications," IEEE Commun. Mag., vol. 38, no. 11, Nov. 2000.
- Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surv., vol. 8R 2nd quarter, 2006.
- A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, no. 6, 2004.
- R. Watro et al., "TinyPK: Securing sensor networks with public key technology," in Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., Washington, DC, Oct. 25, 2004.
- H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. 2003 Symp. Security Privacy, Oakland, CA, May 11-14, 2003.
- S. Slijepcevic et al., "On communication security in wireless ad-hoc sensor networks," in Proc. IEEE 11th Int. Workshop Enabling Technol.: Infrastruct. Collab. Enterprises (WET ICE 2002),
- J. Deng, R. Han, and S. Mishra, "Security support for in-network processing in wireless sensor networks," in Proc. 1st ACM Workshop Security Ad Hoc Sensor Netw., Fairfax, VA, 2003
- P. Ganesan et al., "Analyzing and modeling encryption overhead for sensor network nodes," in Proc. 2nd ACM Int. Conf. Wireless Sensor Netw. Applicat., San Diego, CA, Sep. 19, 2003.
- A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, 2002.