참고문헌
- 유비쿼터스 윤정로(역);최장욱(역)
- The Resurrecting Duckling: Security Issues for Ubiquitous Computing F. Stajano;R. Anderson
- first Security & Privacy supplement to IEEE Computer no.first Security & Privacy suppl. Security for Ubiquitous Computing F. Stajano
- Cryptobytes v.5 no.2 RSA Laboratories The TESLA Broadcast Authentication Protool A. Perrig;R. Canetti;J. D. Tygar;D. Song
- Operating Systems Review v.32 no.4 A new family of authentication protocols R. J. Anderson;F. Bergadano;B. Crispo;J. H. Lee;C. Manifavas;R. M. Needlham
- Proceedings of NDSS'99 Client Puzzles:A Cryptographic Defense Against Connection Depletion Attacks A. Juels;J. Brainard
- UBICOMP2002 Structured Analysis of Security in Ubiquitous Computing R. Zimmer
- EURESCOM Technical Information P1005 Operator specific security requirements for ubiquitous computing F. Vieira;J. Bonnet;C. Loba;R. Schmitz;P. Windrisch;C. Byrne;T. Wall
- Workshop on Security in Ubiquitous Computing, UBICOMP 2002 On Trust for Ubiquitous Computing N. Shankar;W. Arbaugh
- Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Secure Ubiquitous Computing based on Entity Recognition J. Seigneur
- Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Integrating Privacy Enhancing Services in Ubiquitous Computing Environments M. Wu;A. Friday
- Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Authentication in Ubiquitous Computing L. Bussard;Y. Roudier
- Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Identity Management M. Kreutzer
- Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Enabling Secure Ad-hoc Communication using Context-Aware Security in Ubiquitous Computing N. Shankar;D. Bilfanz
- Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Protecting People Location Information U. Hengartner;P. Steenkiste
- Workshop on Security in Ubiquitous Computing, UBICOMP 2002 Threats, Risk Assessment and Policy Management in UbiComp Philip Robinson
- Workshop on Security in Ubiquitous Computing, UBICOMP 2002 A Protection Scheme For Security Policies In Ubiquitous Environments Using One-Way Functions Hakan Kvarnstrom
- Communications of the ACM v.21 no.12 Using Encryption for Authentication in Large Networks of Computers R. M. Needham;M. D. Shroeder
- Public-Key Infrastruture (X.509) (pkix)
- 시사컴퓨터 no.12월 IPSec VPN의 현재 그리고 미래 엄봉식
- ETRI, 최종연구보고서 무선 인터넷 기반의 인증 및 키 교환 프로토콜에 관한 연구
- 무선랜보안 김상철