1 |
한국 인터넷 정보 센터, '2003 하반기 정보화실태조사(요약보고서),' 정보통신부, site at: http://www.mic.go.kr/notice/index_view.jspidx=3400&page_no=1&mode=&selOption=&keyword=
|
2 |
H. Johnson, A. Nilsson, J. Fu, S.F. Wu, A. Chen, H. Huang, 'SOLA: A One-bit Identiry Authentication Protocol for Access Control in IEEE 802.11,' Proceeding of IEEE Global Telecommunications Conference 2002, 1, pp. 768-772, 2002
|
3 |
L. Blum, M. Blum, M. Shub, 'A Simple Unpredictable Pseudo-Random Number Generator,' SIAM Journal on Computing, 15(2), pp. 364-383, 1996
DOI
ScienceOn
|
4 |
A. Menezes, P. van Oorschot, S. Vanstone, 'Handbook of Applied Cryptography,' CRC Press Inc., pp. 175-184, 1997
|
5 |
Kui Ren, Hyunrok Lee, Kyusuk Han, Jaemin Park, Kwangjo Kim, 'An Enhanced Lightweight Authentication Protocol for Access Control in Wireless LANs,' IEEE International Conference On Networks(ICON'04), Hilton, Singapore, Nov. 16-19, 2004
|
6 |
F. Wu, H. Johnson, A. Nilsson, 'SOLA: lightweight security for access control in IEEE 802.11,' IT Professional, 6(3), pp. 10-16, May- June 2004
|
7 |
J. Black, S. Halevi, H. Krawcyk, T. Krovets, P. Rogaway, 'MAC: Fast and secure message authentication,' Proceedings of Lecture Notes in Computer Science, Springer-Verlag, CRYPTO '99, 1666, pp. 216-233, 1999
|
8 |
'IEEE Standard for Information technology-Telecommunications and information exchange between systems- Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements,' IEEE Std 802.11i-2004, pp. 1-175, 2004
|
9 |
H. Krawcyk, M. Bellare, R. Canetti, 'HMAC: Keyed-hashing for messageauthentication,' RFC 2104, Feb. 1997
|
10 |
W. Stallings, 'Cryptography and Network Security Principles and Practice,' Prentice Hall, 2, pp. 74-75, 1999
|
11 |
F. Zhao, Y. Shin, S.F. Wu, H. Johnson, A. Nilsson, 'RBWA: an efficient random-bit window-based authentication protocol,' Proceedings of Global Telecommunications Conference(GLOBECOM '03), 3, pp. 1379-1383, Dec. 1-5, 2003
|
12 |
'Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements-part 11: Wireless Lan Medium Access Control (MAC) And Physical Layer (PHY) Specifications,' IEEE Std 802.11-1997, pp. i-445, Nov. 18, 1997
|
13 |
S. Kent, R. Atkinson, 'Security Architecture for the Internet Protocol,' RFC 2401, Nov. 1998
|
14 |
N. Cam-Winget, R. Housley, D. Wagner, J. Walker, 'Wireless networking security: Security flaws in 802.11 data link protocols,' Communications of the ACM, 46(5), pp. 35-39, May 2003
|
15 |
A. Wool, 'A Note on the Fragility of the 'Michael' Message Integrity Code,' IEEE Transactions on Wireless Communications, 3(5), pp. 1459-1462, Sep. 2004
DOI
ScienceOn
|
16 |
K.L Calvert., S. Venkatraman, J.N. Griffioen., 'FPAC: fast, fixed-cost authentication for access to reserved resources,' Proceedings of IEEE Twenty- First Annual Joint Conference of the IEEE Computer and Communications Societies.(INFOCOM), 2, pp. 1049-1058, Jun. 23-27, 2002
|