Acknowledgement
Grant : 클라우드 보안을 위한 위험기반 인증.전근제어 프레임워크 및 보안상태 점검기술 개발
Supported by : 정보통신기술진흥센터
References
- E. Jang, "Identify and Access Control for Cloud Computing Environment," Review of KIISC, Vol. 24, No. 6, pp. 31-36, Dec., 2014. (in Korean)
- IDC, "Accelerating Innovation on the 3rd Platform," IDC Worldwide Predictions, 2015.
- SPRI, "The August 2014 issue of Monthly Software Industry Trends," Software Policy & Research Institute, pp. 24-26, 2014.
- CSA, "The Notorious Nine: Cloud Computing Top Threats in 2013," Top Threats Working Group, 2013.
- A. Sahai and B. Waters, "Fuzzy Identity based Encryption," Eurocrypt 2005, Vol. 3494, pp. 457-473, May, 2005.
- H. Yoo, "Attribute-based Authentication for Secure Cloud Computing," Journal of KIIT, Vol. 13, pp. 59-69, Jan., 2015. (in Korean)
- J. Mun, G. Kim, Y. Baek and D. Won, "Cryptanalysis of Attribute-based Authentication for Secure Cloud Computing," Proc. of the KIISE Korea Computer Congress 2015, Vol. 42, No. 1, pp. 1034-1036, Jun., 2015. (in Korean)
- L. Xu and F. Wu, "Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care," Journal of Medical Systems, Vol. 39, No. 2, pp. 1-9, 2015. https://doi.org/10.1007/s10916-014-0182-2
- F. Wu and D. Guo, "An improved and provable self-certified digital signature scheme with message recovery," International Journal of Communication System, Vol. 28, No. 2, pp. 344-357, 2015. https://doi.org/10.1002/dac.2673
-
C. Kim, T. Kim and C. Hong, "High Performance Elliptic Curve Cryptographic Processor for GF(
$2^m$ )," Journal of KIISE : Computer Systems and Theory, Vol. 34, No. 3-4, pp. 113-123, 2007. (in Korean)