1 |
http://www.hldp.org
|
2 |
서대희, 이임영, 김해숙, '홈 네트워크에 적용한 블루투스 Security에 관한 연구,' 한국통신학회 하계종합 학술발표회 논문집(상), 제23권 제2호, pp.36-69, 2001
|
3 |
서대희, 이임영, 김영백, 김해숙, 'ECC를 이용한 안전한 피코넷에 관한 연구,' 정보처리학회 2001년도 추계학술발표논문집, 제8권 제2호, pp.911-914, 2001
과학기술학회마을
|
4 |
Borisov, Goldberg and Wagner, 'Intercepting Mobile Communications : The Insecurity of 802.11,' The proceedings of the Secenth Annual International Conference on Mobile Computing and Networking, July, 2001
DOI
|
5 |
최용락, 소우영, 이재광, 이임영, '컴퓨터 통신보안', 도서출판 그린, 2001
|
6 |
Bluetooth White Paper, http://www/bluetooth.com
|
7 |
Bluetooth Sepcification v1.1, http://www.bluetooth.or.kr
|
8 |
CISCO System, Managing Cisco Network Security, Version 2.0, 2001
|
9 |
http://www.infoworld.com/articles/hn/xml/02/02/14020214hnwifispec.xml
|
10 |
http://www.drizzle.com/~aboba/IEEE/wireless.pdf
|
11 |
CISCO System, http://www,cisco.com
|
12 |
Univ.of Maryland, http://www.cs.umd.edu/~waa/wireless.pdf.
|
13 |
Juha T. Vainio, 'Bluetooth Security,' jssmd, 2000, http://niksula.cs.hut.fi/~jiitv/bluesec.html.
|
14 |
Alfred J. Menezes, Paul C. Van Oorschot and Scott A. Vanstone 'HANDBOOK of APPLIED CRYPTOGRAPHY,' CRC
|
15 |
Ullgren,T., 'Security in Bluetooth Key management in Bluetooth,' 2001, http://www.cs.huf.fi/Opinnot/Tik-86.174/sectopics.html
|
16 |
Jakobsson, M. and Wetzel S, 'Security Weakness in Bluetooth' RSA, 2001, http://www.bell-labs.com/user/markusj/bt.html
|
17 |
Stubblefield, Ioannidis and Rubin, 'Using the Fluhrer, Mantin, and Shamir Attack to Break WEP,' AT & T Labs Technical Report TD-4ZCPZZ, Aug, 2001
|