1 |
권혜연,신재욱,이병복,최지혁,남상우,임선배, '이동 Ad hoc 네트워크 기술 동향', 전자통신동향분석, 제18권 제2호, 2003
|
2 |
Y. Hu, D.B. Johnson, and A. Perrig, 'SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks', Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), pp. 3-13, IEEE Calicoon, NY, June 2002
|
3 |
D. Eastlake and P. Jones, 'US Secure Hash Algorithm 1 (SHA1)', IETF RFC 3174, September 2001
|
4 |
C.E. Perkins, E.M. Belding-Royer, and S. Das. 'Ad Hoc On Demand Distance Vector (AODV) Routing', IETF RFC 3561, July 2003
|
5 |
M.G. Zapata. 'Secure Ad hoc On-Demand Distance Vector (SAODV) Routing', IETF Internet Draft, draft-guerrero-manet-saodv-00.txt, August 2001
|
6 |
P. Cheng and R. Glenn, 'Test Cases for HMAC-MD5 and MAC-SHA-1', IETF RFC 2202, September 1997
|
7 |
L. Zhou and Z.J. Haas. 'Securing Ad Hoc Networks', IEEE Network Magazine, November 1999
|
8 |
D.B. Johnson, D.A. Maltz, Y. Hu, and J.G. Jetcheva, 'The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks', IETF Internet Draft, draft-ietf-manet-dsr-07.txt, Work in progress, February 2002
|
9 |
M.G. Zapata and N. Asokan, 'Securing ad hoc Routing Protocols', Wise'02, Atlanta, Georgia, USA, September 28, 2002
|