메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1-396

Embedded systems security: Practical methods for safe and secure software and systems development

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85013844894     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/C2010-0-67275-0     Document Type: Book
Times cited : (43)

References (201)
  • 2
    • 85134634145 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 5374; November
    • Multicast Extensions to the Security Architecture for the Internet Protocol. Internet Engineering Task Force, Request for Comments: 5374; November 2008.
    • (2008)
  • 3
    • 85134634946 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4046; April
    • Multicast Security (MSEC) Group Key Management Architecture. Internet Engineering Task Force, Request for Comments: 4046; April 2005.
    • (2005)
  • 5
    • 13244299564 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 3748
    • Extensible Authentication Protocol (EAP) June 2004, Internet Engineering Task Force, Request for Comments: 3748.
    • (2004) Extensible Authentication Protocol (EAP)
  • 12
    • 84882193960 scopus 로고    scopus 로고
    • Facebook Sees Need for Terabit Ethernet
    • Lawson S. Facebook Sees Need for Terabit Ethernet. Computerworld February 3, 2010.
    • (2010) Computerworld
    • Lawson, S.1
  • 13
    • 0003470642 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4301
    • Security Architecture for the Internet Protocol December 2005, Internet Engineering Task Force, Request for Comments: 4301.
    • (2005) Security Architecture for the Internet Protocol
  • 14
    • 0004006818 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4302
    • IP Authentication Header December 2005, Internet Engineering Task Force, Request for Comments: 4302.
    • (2005) IP Authentication Header
  • 15
    • 0004044627 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4303
    • IP Encapsulating Security Payload (ESP) December 2005, Internet Engineering Task Force, Request for Comments: 4303.
    • (2005) IP Encapsulating Security Payload (ESP)
  • 17
    • 0004115841 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 2409
    • The Internet Key Exchange November 1998, Internet Engineering Task Force, Request for Comments: 2409.
    • (1998) The Internet Key Exchange
  • 18
    • 1442292341 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4306
    • Internet Key Exchange (IKEv2) Protocol December 2005, Internet Engineering Task Force, Request for Comments: 4306.
    • (2005) Internet Key Exchange (IKEv2) Protocol
  • 19
    • 79955764516 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 5996
    • Internet Key Exchange Protocol Version 2 (IKEv2) September 2010, Internet Engineering Task Force, Request for Comments: 5996.
    • (2010) Internet Key Exchange Protocol Version 2 (IKEv2)
  • 24
    • 0004035649 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 2246
    • The TLS Protocol Version 1.0 January 1999, Internet Engineering Task Force, Request for Comments: 2246.
    • (1999) The TLS Protocol Version 1.0
  • 29
    • 33746613037 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4347
    • Datagram Transport Layer Security April 2006, Internet Engineering Task Force, Request for Comments: 4347.
    • (2006) Datagram Transport Layer Security
  • 30
    • 85134633761 scopus 로고    scopus 로고
    • SSH CBC Vulnerability, US-CERT Vulnerability Note VU#958563.
    • SSH CBC Vulnerability, US-CERT Vulnerability Note VU#958563.
  • 31
    • 85134634966 scopus 로고    scopus 로고
    • SSH CRC32 Attack Detection Code Contains Remote Integer Overflow, US-CERT Vulnerability Note VU#945216.
    • SSH CRC32 Attack Detection Code Contains Remote Integer Overflow, US-CERT Vulnerability Note VU#945216.
  • 32
    • 33749461359 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4250
    • The Secure Shell (SSH) Protocol Assigned Numbers January 2006, Internet Engineering Task Force, Request for Comments: 4250.
    • (2006) The Secure Shell (SSH) Protocol Assigned Numbers
  • 33
    • 33749461359 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4251
    • The Secure Shell (SSH) Protocol Architecture January 2006, Internet Engineering Task Force, Request for Comments: 4251.
    • (2006) The Secure Shell (SSH) Protocol Architecture
  • 34
    • 33846448045 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4252
    • The Secure Shell (SSH) Authentication Protocol January 2006, Internet Engineering Task Force, Request for Comments: 4252.
    • (2006) The Secure Shell (SSH) Authentication Protocol
  • 35
    • 33846448045 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4253
    • The Secure Shell (SSH) Transport Layer Protocol January 2006, Internet Engineering Task Force, Request for Comments: 4253.
    • (2006) The Secure Shell (SSH) Transport Layer Protocol
  • 36
    • 33846448045 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 4253
    • The Secure Shell (SSH) Connection Protocol January 2006, Internet Engineering Task Force, Request for Comments: 4253.
    • (2006) The Secure Shell (SSH) Connection Protocol
  • 37
    • 85134636443 scopus 로고    scopus 로고
    • SSH File Transfer Protocol. Internet-Draft from the Secure Shell Working Group.
    • SSH File Transfer Protocol. Internet-Draft from the Secure Shell Working Group.
  • 41
    • 0003487140 scopus 로고    scopus 로고
    • Telecommunications Standardization Section of ITU
    • Recommendation ITU-T H.323 Packet-Based Multimedia Communications Systems December 2009, Telecommunications Standardization Section of ITU.
    • (2009) Packet-Based Multimedia Communications Systems
  • 43
    • 0037984544 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 2543
    • SIP: Session Initiation Protocol June 2002, Internet Engineering Task Force, Request for Comments: 2543.
    • (2002) SIP: Session Initiation Protocol
  • 48
    • 33646909480 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 3711
    • The Secure Real-Time Transport Protocol (SRTP) March 2004, Internet Engineering Task Force, Request for Comments: 3711.
    • (2004) The Secure Real-Time Transport Protocol (SRTP)
  • 57
    • 84882084368 scopus 로고    scopus 로고
    • New Methods in Hard Disk Encryption; Institute for Computer Languages Theory and Logic Group
    • Fruhwirth C. New Methods in Hard Disk Encryption; Institute for Computer Languages Theory and Logic Group. Vienna University of Technology July 18, 2005.
    • (2005) Vienna University of Technology
    • Fruhwirth, C.1
  • 65
    • 70350686780 scopus 로고    scopus 로고
    • Proceedings of the 2nd International Conference on Trusted Computing, TRUST, Oxford, UK, April 6-8, 2009; LNCS 5471, Springer, 2009
    • Turpe S., et al. Attacking the BitLocker Boot Process 2009, Proceedings of the 2nd International Conference on Trusted Computing, TRUST, Oxford, UK, April 6-8, 2009; LNCS 5471, Springer, 2009. DOI: 10.1007/978-3-642-00587-9_12.
    • (2009) Attacking the BitLocker Boot Process
    • Turpe, S.1
  • 67
    • 84882214086 scopus 로고    scopus 로고
    • What is Endpoint Security? http://www.endpointsecurity.org/Documents/What_is_endpointsecurity.pdf.
    • What is Endpoint Security?
  • 70
    • 84882153961 scopus 로고    scopus 로고
    • Greenemeier L. The TJX Effect August 11, 2007, http://www.informationweek.com/news/security/cybercrime/showArticle.jhtml%3FarticleID%3D201400171.
    • (2007) The TJX Effect
    • Greenemeier, L.1
  • 77
    • 84882207681 scopus 로고    scopus 로고
    • Seven Desktop Security Suites Reviewed
    • Skoudis Ed, Carpenter M. Seven Desktop Security Suites Reviewed. Information Security Magazine November 2007, http://searchsecurity.techtarget.com/magazineContent/Product-review-Seven-integrated-endpoint-security-products.
    • (2007) Information Security Magazine
    • Skoudis, E.1    Carpenter, M.2
  • 78
    • 85134633114 scopus 로고    scopus 로고
    • search on vendors Symantec.
    • National Vulnerability Database, search on vendors Symantec. http://web.nvd.nist.gov/view/vuln/search%3Fexecution%3De2s1.
  • 80
    • 85134632766 scopus 로고    scopus 로고
    • http://www.ironkey.com/.
  • 83
    • 85134636003 scopus 로고    scopus 로고
    • search for VMware and/or Xen.
    • National Vulnerability Database, search for VMware and/or Xen. http://web.nvd.nist.gov/view/vuln/search%3Fexecution%3De2s1.
  • 90
    • 84882180539 scopus 로고    scopus 로고
    • Oberheide J., Lanier Z. TEAM JOCH vs. Android January 28-30, 2011, Presentation made at ShmooCon 2011 Conference, Washington, DC. http://n0where.org/talks/shmoo11-teamjoch_v4.pdf.
    • TEAM JOCH vs. Android
    • Oberheide, J.1    Lanier, Z.2
  • 91
    • 0003984174 scopus 로고    scopus 로고
    • Redmond, WA; Microsoft Press
    • McConnell S. Code Complete 2004, Redmond, WA; Microsoft Press. 2nd ed.
    • (2004) Code Complete
    • McConnell, S.1
  • 93
    • 84882093710 scopus 로고    scopus 로고
    • website:
    • General Dynamics website:. http://www.gdc4s.com/content/detail.cfm%3Fitem%3D570bc11a-1d6d-4acf-a68e-c256a615808d%26page%3D2.
    • General Dynamics
  • 94
    • 85134634615 scopus 로고    scopus 로고
    • NSA SELinux Frequently Asked Questions: .
    • NSA SELinux Frequently Asked Questions: . http://www.nsa.gov/research/selinux/faqs.shtml.
  • 95
    • 85134636474 scopus 로고    scopus 로고
    • http://web.nvd.nist.gov/view/vuln/search.
  • 96
    • 85134635380 scopus 로고    scopus 로고
    • http://kerneltrap.org/mailarchive/linux-kernel/2008/2/2/700024.
  • 101
    • 0030243542 scopus 로고    scopus 로고
    • Toward Real Microkernels
    • Liedtke J. Toward Real Microkernels. Communications of the ACM September 1996, 39(9):70-77.
    • (1996) Communications of the ACM , vol.39 , Issue.9 , pp. 70-77
    • Liedtke, J.1
  • 104
    • 84882120396 scopus 로고    scopus 로고
    • US-CERT/NIST National Vulnerability Database Vulnerability Summary for CVE-2011-3402 http://web.nvd.nist.gov/view/vuln/detail%3FvulnId%3DCVE-2011-3402.
    • Vulnerability Summary for CVE-2011-3402
  • 112
  • 115
    • 85134632940 scopus 로고    scopus 로고
    • Maxtor Basics Personal Storage 3200 (PS 3200) virus [205131] Seagate Knowledge Base, online URL http://seagate.custkb.com/seagate/crm/selfservice/search.jsp%3FDocId%3D205131.
    • Seagate Knowledge Base, online URL
  • 116
    • 44449083733 scopus 로고    scopus 로고
    • The Hunt for the Kill Switch
    • Adee S. The Hunt for the Kill Switch. IEEE Spectrum Magazine May 2008, http://spectrum.ieee.org/semiconductors/design/the-hunt-for-the-kill-switch/.
    • (2008) IEEE Spectrum Magazine
    • Adee, S.1
  • 121
    • 85134633593 scopus 로고    scopus 로고
    • Architecture for Interoperability, Specification Version 1.4, Revision 4, May 18
    • Trusted Computing Group (TCG) Trusted Network Connection (TNC) Architecture for Interoperability, Specification Version 1.4, Revision 4, May 18, 2009.
    • (2009)
  • 122
    • 85134635077 scopus 로고    scopus 로고
    • eSecurity Planet; July 19, 2002; online URL:
    • Sharon G. Security Expert: U.S. Companies Unprepared for Cyber Terror eSecurity Planet; July 19, 2002; online URL:. http://www.esecurityplanet.com/trends/article.php/1429851/Security-Expert-US-Companies-Unprepared-For-Cyber-Terror.htm.
    • Security Expert: U.S. Companies Unprepared for Cyber Terror
    • Sharon, G.1
  • 124
    • 85134633665 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/Comparison_of_programming_languages.
  • 127
    • 33751583338 scopus 로고    scopus 로고
    • Microsoft Development Network.
    • Working with Import Libraries and Export Files Microsoft Development Network. http://msdn.microsoft.com/library/default.aspurl=/library/en-us/vccore/html/_core_working_with_import_libraries_and_export_files.asp.
    • Working with Import Libraries and Export Files
  • 132
    • 84856524858 scopus 로고    scopus 로고
    • O'Reilly, Sebastol, CA, C. DiBona, S. Ockman, M. Stone (Eds.)
    • Voices from the Open Source Revolution 1999, O'Reilly, Sebastol, CA. C. DiBona, S. Ockman, M. Stone (Eds.).
    • (1999) Voices from the Open Source Revolution
  • 133
    • 85134634533 scopus 로고    scopus 로고
    • CDRH Software Forensics Lab: Applying Rocket Science to Device Analysis
    • Chloe Taft, "Medical Devices Technology, "The Gray Sheet (October, 2007).
    • "CDRH Software Forensics Lab: Applying Rocket Science to Device Analysis" Chloe Taft, "Medical Devices Technology, "The Gray Sheet (October, 2007).
  • 136
    • 85134636151 scopus 로고    scopus 로고
    • http://www.splint.org.
  • 137
    • 85134634159 scopus 로고    scopus 로고
    • ISO/IEC 9899-1999 (December 1999).
    • ISO/IEC 9899-1999 (December 1999).
  • 138
    • 85134632914 scopus 로고    scopus 로고
    • C-The C1X Charter. Document WG14N1250 (June 2007).
    • C-The C1X Charter. Document WG14N1250 (June 2007).
  • 139
    • 85134632634 scopus 로고    scopus 로고
    • ISO/IEC 14882:2011. Programming Language-C++ (August 2011).
    • ISO/IEC 14882:2011. Programming Language-C++ (August 2011).
  • 144
    • 32544455274 scopus 로고    scopus 로고
    • From MC/DC to RC/DC: Formalization and Analysis of Control-Flow Testing Criteria
    • Sergiy V.A., Bowen J.P. From MC/DC to RC/DC: Formalization and Analysis of Control-Flow Testing Criteria. Formal Aspects of Computing 2002, 18(1).
    • (2002) Formal Aspects of Computing , vol.18 , Issue.1
    • Sergiy, V.A.1    Bowen, J.P.2
  • 146
    • 0037330636 scopus 로고    scopus 로고
    • Understanding the Windows EAL4 Evaluation
    • Shapiro J.S. Understanding the Windows EAL4 Evaluation. Computer February 2003, 36(2):103-105.
    • (2003) Computer , vol.36 , Issue.2 , pp. 103-105
    • Shapiro, J.S.1
  • 158
    • 65749098082 scopus 로고    scopus 로고
    • Embedded Software: Facts, Figures, and Future
    • Ebert C., Jones C. Embedded Software: Facts, Figures, and Future. Computer April 2009, 42(4):42-52.
    • (2009) Computer , vol.42 , Issue.4 , pp. 42-52
    • Ebert, C.1    Jones, C.2
  • 159
    • 0009811887 scopus 로고
    • Notes on Structured Programming. Technological University Eindhoven, Department of Mathematics
    • The Netherlands; August
    • Dijkstra EW. Notes on Structured Programming. Technological University Eindhoven, Department of Mathematics. The Netherlands; August 1969.
    • (1969)
    • Dijkstra, E.W.1
  • 166
    • 0016114085 scopus 로고
    • Monitors: An Operating System Structuring Concept
    • Hoare C.A. Monitors: An Operating System Structuring Concept. Communications of the ACM October 1974, 547-548.
    • (1974) Communications of the ACM , pp. 547-548
    • Hoare, C.A.1
  • 167
  • 168
    • 0026953373 scopus 로고
    • The Esterel Synchronous Programming Language, Design, Semantics and Implementation
    • Berry G., Gonthier G. The Esterel Synchronous Programming Language, Design, Semantics and Implementation. Science of Computer Programming February 1992, 87-152.
    • (1992) Science of Computer Programming , pp. 87-152
    • Berry, G.1    Gonthier, G.2
  • 169
    • 85134633154 scopus 로고    scopus 로고
    • COTS Compartmentalized Operations Protection Profile - Operating Systems (CCOPP-OS), Version 2.0; June 19
    • COTS Compartmentalized Operations Protection Profile - Operating Systems (CCOPP-OS), Version 2.0; June 19, 2008.
    • (2008)
  • 173
    • 85134633706 scopus 로고    scopus 로고
    • Fact Sheet No. 1 for the National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information (CNSSP-15) (June 2003).
    • Fact Sheet No. 1 for the National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information (CNSSP-15) (June 2003).
  • 174
    • 85134636616 scopus 로고    scopus 로고
    • NSA Suite B Cryptography http://www.nsa.gov/ia/programs/suiteb_cryptography.
  • 176
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • Claude S., et al. Communication Theory of Secrecy Systems. Bell System Technical Journal 1949, 28(4):656-715.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Claude, S.1
  • 178
    • 85134634793 scopus 로고    scopus 로고
    • AES Key Wrap Specification http://csrc.nist.gov/groups/ST/toolkit/documents/kms/AES_key_wrap.pdf.
  • 179
    • 85134632867 scopus 로고    scopus 로고
    • Network Working Group, Request for Comments: 3610 (September 2003).
    • Counter with CBC-MAC (CCM). Network Working Group, Request for Comments: 3610 (September 2003).
  • 180
    • 85134632885 scopus 로고    scopus 로고
    • Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality (May 2004).
    • NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality (May 2004).
  • 183
    • 85134636463 scopus 로고    scopus 로고
    • Recommendation for Key Management-Part 1: General (Revised) (March 2007).
    • NIST Special Publication 800-57. Recommendation for Key Management-Part 1: General (Revised) (March 2007).
  • 184
    • 85134632791 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Internet Engineering Task Force, Request for Comments: 5280 (May 2008).
    • Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Internet Engineering Task Force, Request for Comments: 5280 (May 2008).
  • 185
    • 85134636450 scopus 로고    scopus 로고
    • Suite B Certificate and Certificate Revocation List (CRL) Profile, Internet Engineering Task Force, Request for Comments: 5759 January 2010.
    • Suite B Certificate and Certificate Revocation List (CRL) Profile, Internet Engineering Task Force, Request for Comments: 5759 January 2010.
  • 186
    • 85134635389 scopus 로고    scopus 로고
    • SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV), Version 0.97, Certicom Research (March 2011).
    • SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV), Version 0.97, Certicom Research (March 2011).
  • 187
    • 85134633297 scopus 로고    scopus 로고
    • Finding Collisions in the Full SHA-1 (February 2005). Proceedings of Crypto Core.
    • Xiaoyun W, Lisa Y, Hongbo Y. Finding Collisions in the Full SHA-1 (February 2005). Proceedings of Crypto Core.
    • Xiaoyun, W.1    Lisa, Y.2    Hongbo, Y.3
  • 188
    • 85134636721 scopus 로고    scopus 로고
    • Cryptanalysis on SHA-1, Presented by Adi Shamir at the Rump Session of CRYPTO 2005
    • Xiaoyun W, Andrew CY, Frances Y. Cryptanalysis on SHA-1, Presented by Adi Shamir at the Rump Session of CRYPTO 2005.
    • Xiaoyun, W.1    Andrew, C.Y.2    Frances, Y.3
  • 189
    • 0003629991 scopus 로고    scopus 로고
    • Federal Information Processing Publication 180-2
    • Secure Hash Standard August 1, 2002, Federal Information Processing Publication 180-2.
    • (2002) Secure Hash Standard
  • 190
    • 85134635443 scopus 로고    scopus 로고
    • Internet Engineering Task Force, Request for Comments: 2104 (February 1997).
    • HMAC: Keyed-Hashing for Message Authentication, Internet Engineering Task Force, Request for Comments: 2104 (February 1997).
  • 192
    • 85134632583 scopus 로고    scopus 로고
    • NIST Special Publication 800-22-Revision 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (April 2010).
    • NIST Special Publication 800-22-Revision 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (April 2010).
  • 193
    • 85134636500 scopus 로고    scopus 로고
    • Annex C: Approved Random Number Generators for FIPS PUB 140-2, Security Requirements for Cryptographic Modules (DRAFT) (June 14, 2011).
    • Annex C: Approved Random Number Generators for FIPS PUB 140-2, Security Requirements for Cryptographic Modules (DRAFT) (June 14, 2011).
  • 194
    • 85134633773 scopus 로고    scopus 로고
    • Recommendation for Random Number Generation Using Deterministic Bit Generators (Revised) (May 2011).
    • NIST Special Publication 800-90A-Revision 1. Recommendation for Random Number Generation Using Deterministic Bit Generators (Revised) (May 2011).
  • 195
    • 85134632810 scopus 로고    scopus 로고
    • ANSI X9.82-3-2007. Random Number Generation-Part 3: Deterministic Random Bit Generators (September 2007).
    • ANSI X9.82-3-2007. Random Number Generation-Part 3: Deterministic Random Bit Generators (September 2007).
  • 196
    • 84863895358 scopus 로고    scopus 로고
    • Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World
    • Oswald D., Paar C. Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. CHES 2011, Nara September 30, 2011.
    • (2011) CHES 2011, Nara
    • Oswald, D.1    Paar, C.2
  • 197
    • 85134632538 scopus 로고    scopus 로고
    • Telecommunication Standardization Sector, G.729: Coding of Speed at 8 kbit/s Using Conjugate-Structure Algebraic-Code-Excited Linear Prediction (CS-ACELP) (January 2007).
    • International Telecommunications Union. Telecommunication Standardization Sector, G.729: Coding of Speed at 8 kbit/s Using Conjugate-Structure Algebraic-Code-Excited Linear Prediction (CS-ACELP) (January 2007).
  • 199
    • 85134635856 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication 140-2: Security Requirements for Cryptographic Modules, (January 11, 1994).
    • Federal Information Processing Standards Publication 140-2: Security Requirements for Cryptographic Modules, (January 11, 1994).
  • 200
    • 85134635410 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication 140-3: Security Requirements for Cryptographic Modules (Revised DRAFT) (September 11, 2009).
    • Federal Information Processing Standards Publication 140-3: Security Requirements for Cryptographic Modules (Revised DRAFT) (September 11, 2009).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.