P2P 보안 기술 |
Na Jae-Hun
(한국전자통신연구원)
Go Seon-Gi (한국전자통신연구원) Gu Ja-Beom (한국전자통신연구원) Gwon Hyeok-Chan (한국전자통신연구원) Mun Yong-Hyeok (한국전자통신연구원) |
1 | K. Singh, and H. Schulzrinne, Data format and interface to an external peer-to-peer network for SIP location service, draft-singh-p2p-sip-00, IETF, March, 2006 |
2 | M.Bawa, B.F.Cooper, A.Crespo, N.Das wani, 'Peer-to-Peer Research at Stanford' |
3 | http://www.3gpp.org/About/3GPP.ppt |
4 | G. O' Shea and M. Roe, 'Child-proof authentication for MIPv6 (CAM),' SIGCOMM Comput. Commun. Rev., vol. 31, pp, 4-8, 2001 |
5 | http://www.cs.umd.edu/projects/p2prg/ |
6 | T. Aura, Cryptographically Generated Addresses (CGA), IETF, RFC 3972, March, 2005 |
7 | A. Shamir, 'Identity-based cryptosystems and signature schemes,' presented at Proceedings of CRYPTO 84 on Advances in cryptology, Santa Barbara, California, United States, 1985 |
8 | 와이즈피어, http://www.wisepeer.com/ |
9 | T. Aura, 'Cryptographically Generated Addresses (CGA),' RFC 3972, IETF, 2005 |
10 | S. Capkun, J.-P. Hubaux, and L. Buttyan, 'Mobility Helps Peer-to-Peer Security,' IEEE Transactions on Mobile Computing, vol. 5, pp. 43-51, 2006 DOI ScienceOn |
11 | Vatary, P2p live streaming: where from and where to http://www.p2p-zone.com/underground/showthread.php?t=22572 |
12 | P-Grid, http://www.p-grid.org/ |
13 | JXTA projects, http://www.jxta.org/ |
14 | A. Shamir, 'How to share a secret,' Commun. ACM, vol. 22, pp, 612-613, 1979 DOI ScienceOn |
15 | http://www.samrg.org/index.html |