1 |
M. Baugher, D. McGrew, M. Naslund, E. Carrara, K. Norrman, "The Secure Real-time Transport Protocol(SRTP)", RFC 3711, 2004.
|
2 |
E. Rescorla, N. Modadugu, "Datagram Transport Layer Security", RFC 4347, 2006.
|
3 |
C.kaufman, "Internet Key Exchange (IKEv2) Protocol", RFC 4306, 2005.
|
4 |
S. Frankel, S.Krishnan, "IPSec and IKE Document Roadmap", RFC 6071, 2011.
|
5 |
D. McGrew, E. Rescorla, "Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP)", RFC 5764, 2010.
|
6 |
WTO/TBT, www.wto.org
|
7 |
한국인터넷진흥원, "정보보호기반기술 국제 표준화동향 및 전망", 2010.
|
8 |
ISO/IEC 18033-1:2005/Amd 1:2011, "Information technology-- Security techniques--Encryption algorithm--Part 1: General".
|
9 |
Dworkin, M., "Recommendation for Block Cipher Modes of Operation -- Methods and Techniques", NIST Special Publication 800-38A, December 2001,
|
10 |
Whiting, D., Housley, R., and N. Ferguson, "Counter with CBC-MAC (CCM)", RFC 3610, September 2003.
|
11 |
Dworkin, M., "NIST Special Publication 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC", U.S. National Institute of Standards and Technology.
|
12 |
T. Dierks, E. Rescorla, "The Transport Layer Security(TLS) Protocol Version 1.2", RFC 5246, 2008.
|
13 |
S. Kent, "IP Encapsulating Security Payload (ESP)", RFC 4303, 2005.
|