1 |
C. Bettstetter, H. Vogel and J. Eberspacher, 'General Packet Radio Service GPRS : Architecture, Protocols, and Air Interface,' IEEE Communications Surveys 2(3), 1999
|
2 |
S. Burnett and S. Paine, RSA Security's Official Guide to CryptoGraphy, RSA Press, 2001
|
3 |
M. Branchaud, 'A Survey of Public-Key Infrastructures,' Master's thesis, McGill University, 1997
|
4 |
R. Housley, Cryptographic Message Syntax, RFC 2630, Internet Society, 1999
|
5 |
U. Varshney and R. Vetter, 'A Framework for the Emerging Mobile Commerce Applications,' Proceedings of the 34th Hawaii International Conference on System Sciences, 2000
|
6 |
M. Myers, R. Ankney, etc., Internet X.509 Public Key Infrastructure : Online Certificate Status Protocol-OCSP, RFC 2560, IETF, 1999
|
7 |
James A. Senn, 'The Emergence of M-Commerce,' IEEE Computer, December, 2000
DOI
ScienceOn
|
8 |
R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, 1992
|
9 |
FIPS 180-1, Secure Hash Standards,' Federal Information Processing Standards Publication;U.S. Department of Commerce/NIST, 1995
|
10 |
R. Housley, W. Polk, W. Ford and D. Solo, Internet X.509 Public Key Infrastructure : Certificate and CRL Profile. RFC 2459, IETF, 1999
|
11 |
W3C, Extensible Markup Language(XML) 1.0 Technical report, http://www.w3.org/TR/1998/REC-xml-19980210, 1998
|
12 |
한국정보보호진흥원, 무선 PKI 기술 규격, http://www.kisa.or.kr, 2001
|
13 |
M. Heijden and M. Taylor, Understanding WAP : Wireless Application, Devices, and Services, Artech House, 2000
|
14 |
A. Jurisic and A. J. Menezes, 'Elliptic Curves and Cryptography,' Dobb's Journal, April, 1997
|
15 |
전병선, Microsoft Visual C++ 6.0 ATL COM Programming, 삼양출판사, 1999
|