1 |
N. Doraswamy and D. Harkins, IPsec : The New Security Standard for the Internet, Intranets, and Virtual Private Networks, Prentice Hall, 1999
|
2 |
정보통신부, http://www.mic.go.kr/
|
3 |
권혁찬, 나재훈, 손승원, 'IPv5 Security 동향,' 주간기술동향, 1094호, 한국전자통신연구원, Sept., 2002
|
4 |
H. C. Kwon, S. C. Kim, J. H. Nah, T. Y. Nam, S. W. Sohn, An Automatic Security Test Engine for IPv6 Network, Proc. of the International Workshop on Cryptology and Network Security(CNS'2003), pp.685-690, Miami, Florida, USA, Sept., 2003
|
5 |
ISS, ISS Internet Scanner, http://www.iss.net/
|
6 |
S. Deering, R. Hinden, Internet Protocol, Version 6(IPv6) Specification, RFC2460, Dec., 1998
|
7 |
S. Kent and R. Atkinson, Security Architecture for the Internet Protocol, RFC2401, Nov., 1998
|
8 |
S. Kent and R. Atkinson, IP Authentication Header, RFC 2402, Nov., 1998
|
9 |
S. Kent and R. Atkinson, IP Encapsulating Security Payload, RFC2406, Nov., 1998
|
10 |
D. Harkins, D. Correl, Internet Key Exchange, RFC2409, Nov., 1998
|
11 |
Cisco Scanner, http://www.cisco.com/univercd/cc/td/doc/pcat/nssq.htm
|
12 |
LANguard Network&Port scanner, http://www.gfi.com/languard/lanscan.htm
|
13 |
A. Rubini, Linux Device Drivers, 1998, O'Reilly
|
14 |
S. Garfinkel and G. Spafford, Practical UNIX and Internet Security, 2nd edition, O'Reilly, 1996
|
15 |
M. Y. Lee, Internet Security Cryptographic principles, algorithms and protocols, WILEY, 2003
|
16 |
J. H. Jeong, J. H. Nah, S. W. Sohn and J. T. Lee, 'C-ISCAP:Controlled-Internet Secure Connectivity Assurance Platform,' Proc. of the IEEE ICEIS2001, Vol.2, pp.920-925
|
17 |
J. S. Lee, S. C. Kim and S. W. Sohn, A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management, pp.246-260, LNCS 2015, Dec., 2000
|