보안토큰의 취약성/보안요구사항 분석 및 CC v3.1 기반 보호프로파일 개발
Vol. 18, No. 2, pp. 139-150,
4월.
2008
10.13089/JKIISC.2008.18.2.139, Full Text:
Keywords: security token, threats, Protection profile, CC
Abstract Statistics
Cite this article
10.13089/JKIISC.2008.18.2.139, Full Text:
Keywords: security token, threats, Protection profile, CC
Abstract Statistics
Cite this article
[IEEE Style]
J. Kwak, S. Hong, W. Yi, "Vulnerability and Security Requirement Analysis on Security Token and Protection Profile Development based on Common Criteria Version 3.1," Journal of The Korea Institute of Information Security and Cryptology, vol. 18, no. 2, pp. 139-150, 2008. DOI: 10.13089/JKIISC.2008.18.2.139.
[ACM Style]
Jin Kwak, Soon-Won Hong, and Wan-Suck Yi. 2008. Vulnerability and Security Requirement Analysis on Security Token and Protection Profile Development based on Common Criteria Version 3.1. Journal of The Korea Institute of Information Security and Cryptology, 18, 2, (2008), 139-150. DOI: 10.13089/JKIISC.2008.18.2.139.