참고문헌
- WTO/TBT, www.wto.org
- 한국인터넷진흥원, "정보보호기반기술 국제 표준화동향 및 전망", 2010.
- ISO/IEC 18033-1:2005/Amd 1:2011, "Information technology-- Security techniques--Encryption algorithm--Part 1: General".
- Dworkin, M., "Recommendation for Block Cipher Modes of Operation -- Methods and Techniques", NIST Special Publication 800-38A, December 2001,
- Whiting, D., Housley, R., and N. Ferguson, "Counter with CBC-MAC (CCM)", RFC 3610, September 2003.
- Dworkin, M., "NIST Special Publication 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC", U.S. National Institute of Standards and Technology.
- T. Dierks, E. Rescorla, "The Transport Layer Security(TLS) Protocol Version 1.2", RFC 5246, 2008.
- S. Kent, "IP Encapsulating Security Payload (ESP)", RFC 4303, 2005.
- M. Baugher, D. McGrew, M. Naslund, E. Carrara, K. Norrman, "The Secure Real-time Transport Protocol(SRTP)", RFC 3711, 2004.
- E. Rescorla, N. Modadugu, "Datagram Transport Layer Security", RFC 4347, 2006.
- C.kaufman, "Internet Key Exchange (IKEv2) Protocol", RFC 4306, 2005.
- S. Frankel, S.Krishnan, "IPSec and IKE Document Roadmap", RFC 6071, 2011.
- D. McGrew, E. Rescorla, "Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP)", RFC 5764, 2010.