1 |
BlueKrypt. (2012). NIST Report on Cryptographic Key Length and Cryptoperiod [Internet]. Available: http://www.keylength.com/en/4/.
|
2 |
D. K. Too, S. J. Han, "A Study of Key Distribution for Security on VANET," Journal of the Korea Institute of Information and Communication Engineering, vol. 16, no. 10, pp. 2192-2198, October 2012.
DOI
|
3 |
OpenSSLWiki. Elliptic curve Diffie Hellman [Internet]. Available: http://wiki.openssl.org/index.php/Ellipttic_Curve_Diffie_Hellman.
|
4 |
G. Huston, "IP Multi-Addressing and Multipath TCP," The Internet Protocol Journal, vol. 18, no. 2, pp. 2-12, June 2015.
|
5 |
WIKIPEDIA. Multipath TCP [Internet]. Available: http://en.wikipedia.org/wiki/Multipath_TCP.
|
6 |
H. E, Go, J. U. Lee, S. H. Back, and J. H. Hwang "Multipath TCP (MPTCP) standardization and technology development trends," Journal of The Korean Institute of Communication Sciences, vol. 31, no. 9, pp. 9-16, September 2014.
|
7 |
S. H. Sun, E. G. Kim, "A study on the Key Exchange Using ECDH in MPTCP," in Proceeding of the 4th Annual Conference on Engineering and Information Technology, Kyoto, Japan, pp. 84-89, March 2016.
|
8 |
L. T. Tuan, K. S. Kim, J. K. Choe, and S. H. Ro, "A Study on Multi-Path TCP Mobility Management Protocol," Journal of KIIT, vol. 12, no. 6, pp. 109-117, June 2014.
|
9 |
A. Ford, C. Raiciu, M. Handley, TCP Extensions for Multipath Operation with Multipath Addresses, RFC 6824, IETF, 2013.
|
10 |
M. Bagnulo, Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses, RFC 6181, IETF, 2011.
|
11 |
K. J. Ha, C. H. Seo, D. Y. Kim, "Design of Validation System for a Crypto-Algorithm Implementation," Journal of the Korea Information and Communication Society, vol. 39, no. 4, pp. 242-250, April 2014.
|