1 |
M. Burrows, M. Abadi and R. Needham, "A Logic of Authentication," ACM Trans. Computer Systems, Vol. 1, pp. 18-36, 1990
DOI
|
2 |
G. O'Shea and M. Roe, "Child-proof authentication for MIPv6 (CAM)," ACM Computer Communications Review, Vol. 31, No. 2, April, 2001
|
3 |
Ilsun You, "Improving the Kang-Park's Protocol for Securing Binding Update in MIPv6," Journal of The Institue of Electronics Enginners of Korea, Vol. 44-TC, No. 10 pp.148-155, Oct., 2007
과학기술학회마을
|
4 |
Ilsun You and Sung Kyo Choi, "An Improvement of Mobile IPv6 Binding Update Protocol Using Address Based Keys," Journal of The Institue of Electronics Enginners of Korea, Vol. 42-CI, No. 5 pp.21-30, Sep., 2005
과학기술학회마을
ScienceOn
|
5 |
T. Aura, "Cryptographically Generated Addresses (CGA)," RFC 3972, March 2005
|
6 |
J. Arkko, C. Vogt and W. Haddad, "Enhanced Route Optimization for Mobile IPv6," IETF RFC 4866, May, 2007
|
7 |
J. Li , J. Huai, Q. Li and X. Li, "Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method," Springer-Verlag LNCS, Vol. 3794, pp. 1073-1080, December, 2005
|
8 |
R. Deng, J. Zhou, and F. Bao, "Defending Against Redirect attacks in Mobile IP," Proceedings of the 9th ACM Conference on Computer and Communications Security, Nov., 2002
|
9 |
D. Johnson, C. Perkins and J. Arkko, "Mobility Support in IPv6," IETF RFC 3775, June, 2004
|