1 |
T. Aura, 'Cryptographically Generated Addresses (CGA),' IETF RFC 3972, Mar. 2005
|
2 |
G. Montenegro, C. Castelluccia, 'Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Address,' Proc. of the Network and Distributed System Security (NDSS 2002), Feb. 2002
|
3 |
Y. Qiu, J. Zhou, F. Bao, 'Protecting All Traffic Channels in Mobile IPv6 Network', Proc. of the IEEE Wireless Communications and Networking Conf., pp. 160-165, Mar. 2004
|
4 |
D. Johnson, C. Perkins, J. Arkko, 'Mobility Support in IPv6,' IETF RFC 3775, Jun. 2004
|
5 |
S. Thomson, T. Narten, 'IPv6 Stateless Address Autoconfiguration,' IETF RFC 2462, Dec. 1998
|
6 |
G. Montenegro, C. Castelluccia, 'Crypto-Based Identifiers (CBID): Concepts and Application,' ACM Trans. on Infomation and System Security, Vol. 7, No. 1, pp. 97-127, Feb. 2004
DOI
|
7 |
J. Arkko, V. Devarapalli, F. Dupont, 'Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents,' IETF RFC 3776, Jun. 2004
|
8 |
H. Soliman, Mobile IPv6: Mobility in a Wireless Internet, Addison Wesley, 2004
|
9 |
P. Nikander, J. Arkko, T. Aura, G. Montenegro, E. Nordmark, 'Mobile IP Version 6 Route Optimization Security Design Background,' IETF RFC 4225, Dec. 2005
|
10 |
G. O'shea, M. Roe, 'Child-proof Authentication for MIPv6 (CAM),' ACM Computer Communication Review, Vol 31, No. 2, pp. 4-8, Jul. 2001
|
11 |
강현선, 박창섭, 'Redirect 공격과 DoS 공격에 안전한 MIPv6 바인딩 갱신 프로토콜', 한국정보보보학회 논문집, 제15권, 제5호, pp. 115-124, 2005
|