1 |
김찬호, 'MMORPG의 핫이슈 클라이언트 해킹과 보안,' 마이크로소프트웨어, pp. 201-205, 3월, 2004
|
2 |
윤재우, 이승형, 'IP 기반 VPN 프로토코릐 연구동향 : 확장성과 보안성.; 정보보호학회지, 제11권, 제6호, pp. 53-43, 2001
|
3 |
T. Ritter, 'Cryptography: is staying with the herd really best?' IEEE Computer Society Magazine, vol.32, no. 8, pp. 94-95, 1999
|
4 |
T. Ritter, 'Multiciphering and random cipher selection in shannon,' http://www.ciphersbyritter.com/NEWS6/MULTSHAN.HTM
|
5 |
C. B. Roellgen, 'The polymorphic cipher,' http://www.pmc-ciphers.com/
|
6 |
R. Bolla, M. Marchese and S. Zappatore, 'A congestion control scheme for multimedia traffic in packet switching best-effort networks,' Lecture Notes in Computer Science, vol. 1242, pp, 523-536, 1997
DOI
ScienceOn
|
7 |
Technical Standard, 'Common security : CDSA and CSSM, version 2,' The Open Group, May, 2000 (http://www. opengroup. org/publications/catalog/ c914.htm).
|
8 |
X. Liu and A. M. Eskicioglu, 'Selective encryption of multimedia content in distribution networks: challenges and new directions,' lASTED International Conference on Communications, Internet and Information Technology (GIlT 2003), November, 2003
|
9 |
C. E. Shannon, 'Communication theory of secrecy systems,' Bell System Technical Journal. 28, pp. 656-715, 1949
DOI
|
10 |
R. Jain, 'Congestion control and traffic management in ATM networks: recent advances and a survey,' Computer Networks and ISDN Systems, vol. 28, no. 13, pp. 1723-1738, 1996
DOI
ScienceOn
|
11 |
H. Cheng and X. Li, 'Partial encryption of compressed images and video,' IEEE Transactions on Signal Processing, vol. 48, no. 8, pp. 2439-2451. 2000
DOI
ScienceOn
|
12 |
이성은, 장흥종, 박인재, 한선영, '다중 암호화 기법을 활용한 하이브리드 스마트카드 구현,' 정보보호학회지, 제13권, 제2호, pp. 81-89, 2003
|
13 |
유선실, '소프트웨어 및 인테넷 콘텐츠 편 : 온라인 게임', 정보통신산업동향-소프트웨어 및 인테넷 콘텐츠 편, 제1권, pp. 131-144, 2002
|
14 |
J. J. Yan and H. J Choi, 'Security issues in online games,' Electronic Library, vol. 20, no. 4, pp. 125-133, 2002
DOI
|
15 |
정윤경, 기준백, 천정희, '온라인 게임 아이템의 안전한 전자 거래 시스템,' 정보보호학회논문지, 제13권, 제3호, pp. 91-99, 2003
|
16 |
W. Stallings, Cryptography and Network Security: Principles and Practices, 3rd ed., Prentice-Hall, 2003
|
17 |
한국전자통신연구원, '온라인 게임 엔진 기술 개발,' 연차보고서, 4월, 2004
|
18 |
C. B. Roellgen, 'On the security of polymorphic encryption,' http://www.pmc-ciphers.com/
|