Browse > Article

P2P 보안 기술  

Na Jae-Hun (한국전자통신연구원)
Go Seon-Gi (한국전자통신연구원)
Gu Ja-Beom (한국전자통신연구원)
Gwon Hyeok-Chan (한국전자통신연구원)
Mun Yong-Hyeok (한국전자통신연구원)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Singh, and H. Schulzrinne, Data format and interface to an external peer-to-peer network for SIP location service, draft-singh-p2p-sip-00, IETF, March, 2006
2 M.Bawa, B.F.Cooper, A.Crespo, N.Das wani, 'Peer-to-Peer Research at Stanford'
3 http://www.3gpp.org/About/3GPP.ppt
4 http://www.cs.umd.edu/projects/p2prg/
5 와이즈피어, http://www.wisepeer.com/
6 T. Aura, 'Cryptographically Generated Addresses (CGA),' RFC 3972, IETF, 2005
7 G. O' Shea and M. Roe, 'Child-proof authentication for MIPv6 (CAM),' SIGCOMM Comput. Commun. Rev., vol. 31, pp, 4-8, 2001
8 T. Aura, Cryptographically Generated Addresses (CGA), IETF, RFC 3972, March, 2005
9 A. Shamir, 'Identity-based cryptosystems and signature schemes,' presented at Proceedings of CRYPTO 84 on Advances in cryptology, Santa Barbara, California, United States, 1985
10 S. Capkun, J.-P. Hubaux, and L. Buttyan, 'Mobility Helps Peer-to-Peer Security,' IEEE Transactions on Mobile Computing, vol. 5, pp. 43-51, 2006   DOI   ScienceOn
11 Vatary, P2p live streaming: where from and where to http://www.p2p-zone.com/underground/showthread.php?t=22572
12 P-Grid, http://www.p-grid.org/
13 JXTA projects, http://www.jxta.org/
14 A. Shamir, 'How to share a secret,' Commun. ACM, vol. 22, pp, 612-613, 1979   DOI   ScienceOn
15 http://www.samrg.org/index.html