참고문헌
- 김병천, 이경호, 박성준, 원동호, '전자 서명 방식의 구현 및 성능분석', 제4회 통신정보 합동학술대회 논문집, pp.662-666, 1994
- W. Diffie and M. E.Hellman, 'New directions In cryptography,' IEEE Trans. on Information Theory IT-22 No.6, pp.644-654, 1976
- Warwick Ford, Michael S. Baum, Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, Prentice Hall, 2000
- Niemeyer, R.E., 'Using Web technologies in two MLS environments: a security analysis,' Computer Security Applications Conference, 1997. Proceedings, 13th Annual, Page(s): 205-214, 1997 https://doi.org/10.1109/CSAC.1997.646191
- 박일환, 장청룡, 원동호, '증명이 가능한 전자서명기법', 한국통신정보보호학회 논문지, 제4권/1호, pp.41-50, 1994
- Lala, C,; Panda, B., 'Evaluating damage from cyber attacks: a model and analysis Systems, Man and Cybernetics,' Part A, IEEE Transactions on, Volume: 31 Issue: 4, Page(s): 300-310, July 2001 https://doi.org/10.1109/3468.935047
- Lincoln D. Stein, Web Security: A Step-by-Step Reference Guide, Addison-Wesley, 1999
- Donna Woouteiler, Web Security; A Matter of Trust, O'Reilly & Associates, 1997
- Younglove, R.W., 'IP security: what makes it work?,' Computing & Control Engineering Journal, Volume: 12 Issue: 1 , Pagers): 44-46, Feb 2001 https://doi.org/10.1049/cce:20010107
- Rubin, A.D.; Geer, D.E., Jr., 'A survey of Web security,' Computer, Volume: 31 Issue: 9, Page(s): 34-41, Sept. 1995 https://doi.org/10.1109/2.708448
- A.O. Frier, P. Karlton, and P.C. Kocher, The SSL protocol version 3.0, dratt-ietf-tls-ssl-version3-00.txt, November 18, 1996
- Wangham, M.S.; Lung, L.C. Westphall, C.M.; Fraga, J,S. 'Integrating SSL to the JaCoWeb security framework: project and implementation,' Integrated Network Management Proceedings, 2001 IEEE/IFIP International Symposium on, Page(s): 779-792, 2001 https://doi.org/10.1109/INM.2001.918080
- Gutzmann, K, 'Access control and session management in the HTTP environment,' IEEE Internet Computing, Volume:5 Issue: 1 , Page(s): 26-35, Jan.-Feb. 2001 https://doi.org/10.1109/4236.895139
- Debary, P.; Caswell, D., 'Uniform Web presence architecture for people, places, and things,' IEEE Personal Communications, Volume: 8 Issue: 4, Page(s): 46-51, Aug. 2001 https://doi.org/10.1109/98.944003
- Anup K. Ghosh, E-Commerce Security: Weak Links, Best Defenses, John Wiley & Sons, 1995
- Liu, S.; Sullivan, J.: Ormaner, J' 'A practical approach to enterprise it security,' IT Professional, Volume: 3 Issue: 5, Page(s): 35-42, Sep/Oct 2001 https://doi.org/10.1109/6294.952979
- D.L.Dill., 'The Murpi verification system,' In Computer Aided Verification 8th International Conference, pages 390-403, 1996 https://doi.org/10.1007/3-540-61474-5_86
- 염흥렬, '전자 서명 방식 고찰,' 한국통신정보보호학회 학회지, 제3권/2호, pp.7-18. 1993
- R.C. Merkle and M. E. Hellman 'Hiding Information and signatures in trap-door knapsacks,' IEEE Trans. On Information Theory IT-24, No.5 pp.525-530, 1978
- K. Nyberg and R. A. Rueppel, 'Message recovery for signature scheme based on the discrete logarithm problem,' Eurocrypt'94 Proceedings, Springer-Verlag, 1995 https://doi.org/10.1007/BFb0053434
- Ronald L. Rivest, Adi Shamir, Len Adelman, 'On Digital Signatures and Public Key Crypto systems,' MIT Labatory for Computer Science Technical Memorandum 82, 1972
- S. C. Pohlig and M. E. Hellman, 'An improved algorithm for computing logarithm over GF(p) and its cryptographic significance,' IEEE Trans. on Information Theory IT -24, No.5, pp.106-110, 1978
- R. L. Rivest, A. Shamir and L. Adleman, 'A method of obtaining digital signature and public key cryptosystem,' ACM Communication 21 No.2, pp.120-126, 1978 https://doi.org/10.1145/359340.359342
- Mohammed J. Kabir, 'Apache Server Bible,' IDG Books Worldwide, 1998
- Bob Quinn, Dave Shute, Windows Sockets Network Programming, Addison-Wesley, 1995