1 |
Margaret Rouse. Telnet definition from The Tech Dictionary and IT Encyclopedia WhatIs.com site [Internet]. Available: http://sear chnetworking.techtarget.com/definition/Telnet
|
2 |
Behrouz A. Forouzan, TCP/IP Protocol Suite, 4th ed. New York, NY: McGraw Hill, ch. 20, pp.624, 2010.
|
3 |
IETF Std. RFC 2941, Telnet Authentication Option, IETF, J. Altman. 2000.
|
4 |
IETF Std. RFC 4251, The Secure Shell (SSH) Protocol Archi tecture, IETF, T. Ylonen. 2006.
|
5 |
Seok-Ho Kim, "Comparison and analysis on efficiency of sca lar multiplication for Elliptic Curve Cryptosystem," M.S. dissertation, Korea Maritime and Ocean University, Busan, 2003.
|
6 |
SECG Std. SEC 1, SEC 1: Elliptic Curve Cryptography Version 2.0, SECG, Certicom Research, 2009.
|
7 |
Jae-Won Ahn, Beom-Jin Choi, Sung-Jin Ok, Jung-Ha Kang, Jae-Young Kim, Eun-Gi Kim, "Design and implementation of file transfer protocol supporting security functionalities," Journal of the Korea Academia-Industrial cooperation Society, vol.15, no.5, pp.3086-3092, May. 2014.
DOI
|
8 |
FIPS Std. FIPS PUB 197, Adveanced Encryption Standard (AES), FIPS, NIST, 2001.
|
9 |
Wikipedia, The Free Encyclopedia. Cryptography hash function from Wikipedia.org site [Internet]. Available: http://en.wikipedia.org/wiki/Cryptographic_hash_function
|
10 |
Seung-peom Park, Jae-won Ahn, Eun-gi Kim, "Design and Implementation of Secure Vehicle Communication Protocols for WAVE Communication Systems," Journal of the Korea Institute of Information and Communication Engineering, vol.19, no.4, pp.841-847, Apr. 2015.
DOI
|
11 |
IETF Std. RFC 2104, HMAC: Keyed-Hashing for Message Authentication, IETF, H. Krawczyk, M. Bellare, R. Canetti, 1997.
|
12 |
Jeong-Ki Seong, Hye-In Seo, Jae-Won Ahn, Seung-Peom Park, Eun-Gi Kim, "A study on the TELNET protocol supporting security functionalities," in Proceeding of the 2015 Fall Conference of the KIPs, Jeju, pp. 1-3, 2015.
|
13 |
IETF Std. RFC 854, Telnet Protocol Specification, IETF, J. Postel, J. Reynolds, 1983.
|
14 |
IETF Std. RFC 855, Telnet Option Specifications, IETF, J. Postel, J. Reynolds, 1983.
|
15 |
NIST Special Publication 800-57, Recommendation for Key Management, NIST, Gaithersburg, MD, 2012.
|
16 |
Wikipedia, the free encyclopedia. Certificate authority from Wikipedia.org site [Internet]. Available: http://en.wikipedia.org/wiki/Certificate_authority
|
17 |
IETF Std. RFC 6234, US Secure Hash Algorithms(SHA and SHA-based HMAC and HKDF), IETF, D. Eastlake 3rd, Huawei, T. Hansen, 2011.
|
18 |
TechiWarehouse. IP spoofing and sniffing from Techiwarehouse.com site [Internet]. Available: http://techiwarehouse.com/engine/423a5281/IP-Spoofing-and-Sniffing
|