1 |
강현선, 박창섭, 'Redirect 공격과 DoS 공격에 안전한 MIPv6 바인딩 갱신 프로토콜,' 한국정보보호학회논문지, 제15권, 제5호, 115-124쪽, 2005
과학기술학회마을
|
2 |
G. Montenegro, C. Castelluccia, 'Crypto- Based Identifiers(CBIDs): Concepts and Applications,' ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 97-127, Feb. 2004
DOI
|
3 |
G. O'Shea and M. Roe, 'Child-proof authentication for MIPv6 (CAM),' ACM Computer Communications Review, vol. 31, no. 2, April 2001
|
4 |
Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, and Robert H. Deng, 'Routing optimization security in mobile IPv6,' Computer Networks, vol. 50, issue 13, pp. 2401-2419, Elsevier, Sep. 2006
DOI
ScienceOn
|
5 |
J. Arkko, C. Vogt and W. Haddad, 'Enhanced Route Optimization for Mobile IPv6,' IETF RFC 4866, May 2007
|
6 |
C. Vogt and J. Arkko, 'A Taxonomy and Analysis of Enhancements to Mobile IPv6 Route Optimization,' IETF RFC 4651, Feb. 2007
|
7 |
D. Johnson, C. Perkins and J. Arkko, 'Mobility Support in IPv6,' IETF RFC 3775, June 2004
|
8 |
Tuomas Aura. 'Mobile IPv6 Security,' In Proc. Security Protocols, 10th International Workshop, LNCS, volume 2845, pp. 215-228, Cambridge, UK, April 2002. Springer 2003
|