References
- Christian Huitema, 'Challenges of the Next Generation Networks', Keynote for Internet'99 Conference, Moscow Oct. 25-28
- T. Sweeney,'Next Generation Networks: The Future of Business', http://www.a1cate1.com/news1ink/0102/cover.htm, Alcatel Newslink 2nd Quarter 2001
- NGN SG, 'Conclusion from the NGN SG', ETSI 38th General Assembly Meeting, Nov. 2001
- B. Gamm, B. Howard, O. Paridaens 'Security Features Required in an NGN', Alcatel Telecommunications Review, pp. 129-133, 2nd Quarter 2001
- 장청룡, 'SEED의 활용과 표준화'. SIS 2000 제 5회 정보보호심포지움, pp. 397-416., 2000년 7월
- 이경석 외. 민간부문 전자상거래시 암호사용에 대한 연구. 산업자원부. 1999년 10월
- ETSI, 'Service Independent require ments definition; Threat Analysis (TIPHON Release 4)' ETSI Technical Report 101 771 VI. 1.1, April 2001
- 한국정보보호센터, 정보보호총서, 제 21장 컴퓨터네트워크 보안, pp. 537-565, 1996년 12월
- Cable television Laboratory Inc., 'PacketCable 1.2 Architecture Technical Report, PKT TR ARCH1.2 V01 001231', Nov. 2000
- MWIF,'MWIF Technical Report MTR-004', http://www.mwif.org
- Brain Project, http://ist-brain.org
- Hiper Project, http://www.etsi.org/technica1activ/hiper1an2.htm
- IETF Security Area, http://www.ietf.org/htm1.charters/wg-dir.htm1#Security%20Area
- T. Kuhn, 'Interim Report Security Architecture for Future Mobile Terminals and Applications'. SHA/DOC/SAG/WP2/D03/2.0, Nov. 2001
- C. Mitchell, 'Initial report on PKI requirements for heterogeneous roaming and distributed terminals', SHA/D0C/RHUL/WP3/D04/1.0, Sep.2001