References
- Paul Syverson, 'A Taxonomy of Replay Attacks', In Proceeding IEEE Computer Security Foundations Workshop VII, pages 131-136. IEEE Computer Society Press, June 1994
- Oram, A.: Peer-to-Peer : 'Harnessing the Benefits of a Disruptive Technology', 1st edn. O'Reilly, Beijing; Sebastopol, CA(2001)
- 권혁찬, 문용혁, 구자범, 고선기, 나재훈, 장종수, 'P2P 표준화 및 기술 동향', 전자통신동향분석, u-IT839의 정보보호 이슈 특집 논문, 한국전자통신연구원, 22권 1호(통권 103호) 2007.02
- Michal Feldman, et al., 'Free-Riding and Whitewashing', Selected Areas in Communications, IEEE Journal on Pages 1010-1019, Vol.24, Issue 5, May 2006 https://doi.org/10.1109/JSAC.2006.872882
- John R. Douceur, 'The Sybil Attack', The 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), 2-8 March 2002, MIT Faculty Club, Cambridge, MA, USA
- Committee on National Security Systems(CNSS) Instruction No. 4009, National Information Assurance (IA) Glossary, published by the United States Federal government, Revised June, 2006
- John Brainard, et al., 'Fourth-Factor Authentication: Somebody You Know', ACM Conference on Computer and Communications Security (CCS'06), October 30-November 3, 2006, Alexandria, Virginia, USA
- N, Haller, et al., 'One-Time Password System', RFC 2289, IETF OPT Working Group, Feb, 1998
- Neil M. Haller, 'The S/KeyTM One-Time Password System', Bellcore, Morristown, New Jersey
- Y.Zhang and D.Zhang, 'Authentication and Access Control in P2P Network', LNCS 3032, 2004
- Philip Zimmermann, 'The Official PGP User's Guide', MIT Press,. 1994
- Carl Ellison and Bruce Schneier, 'Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure', Computer Security Journal, Vol. XVI. Number 1, 2000
- '전자거래 안정성 강화 종합대책', 금융감독원 (FSS), 2005. 9
- '금융정보화 주요동향 제84호', 보험개발원(KIDI), 2007. 1
- Daniel Brookshier et al., 'Chap. 8” JXTA and Security in JXTA: Java P2P Programming', Published by Sams, June, 2002
- Prem Devanbu, et al., 'The Next Revolution: Free, Full, Open Person-2-Person (P2P) E-commerce', July 3, 2000