1 |
J. Arkko and H. Haverinen, "Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement(EAP-AKA)," RFC 4187, Jan. 2006.
|
2 |
박윤옥, 최정필, 김준우, 방승재, 안지환, "4세대 이동통신 핵심기술 WiBro Evolution 시스템 개발," 전자통신동향분석, 24(3), pp. 44-53, 2009 년 6월.
|
3 |
배성수, 최동훈, 최규태, 와이브로 기술과 시스템, 세화, 2006년 8월.
|
4 |
이재일, 원유재, 지승구, 이태진, "와이브로 보안기술 해설서," 한국정보보호진흥원, 2006년 8월.
|
5 |
C.Y. Tseng, P. Balasubra-manyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A Specification-Based Intrusion Detection System For AODV," 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), pp. 125-134, Oct. 2003.
|
6 |
R. Gill, J. Smith, and A. Clark, "Specification- Based Intrusion Detection in WLANs," Proceedings of the 22nd Annual Computer Security Application Conference, pp. 141-152, Dec. 2006.
|
7 |
M. Barbeau, "WiMax/802.16 Threat Analysis," Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 8-15, Oct. 2005.
|
8 |
B. Aboba, B. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, "Extensible Authentication Protocol(EAP)," RFC 3748, June 2004.
|