Design of the Covered Address Generation using the Super Increasing Sequence in Wireless Networks |
Choun, Jun-Ho
(숭실대학교 대학원 컴퓨터학과)
Kim, Sung-Chan (숭실대학교 대학원 컴퓨터학과) Jang, Kun-Won (숭실대학교 일반대학원 컴퓨터학과) Do, Kyung-Hwa (산자부 정보보안기술(JTC1/SC27) 전문위원회) Jun, Moon-Seog (숭실대학교 IT 대학) |
1 | Leonard M. Adleman. On Breaking Generalized Knapsack Public Key Cryptosystems, In Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing. ACM, New York. 1983, pp.402-412 DOI |
2 | Y.-C. Hu and A. Perrig, 'A survey of secure wireless ad hoc routing,' IEEE Security & Privacy, vol. 4, pp.28.39, May/June 2004 DOI ScienceOn |
3 | A. A. Pirzada and C. McDonald, 'Establishing trust in pure ad-hoc networks,' Proceedings of the 27th Australasian Computer Science Conference (ACSC), vol. 26, no. 1, pp.47.54, 2004 |
4 | P. Papadimitratos and Z. Haas, 'Secure routing for mobile ad hoc networks,' in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, January 2002, pp.27.31 |
5 | B. Preneel, Lectures on Data Security: Modem Cryptology in Theory and Practice. Heidelberg: Springer-Verlag, 1999, vol. 1561, ch. The State of Cryptographic Hash Functions, pp.158.182 DOI ScienceOn |
6 | 11.R.L.Rivest.RFC 1321 : The MD5 Message-Digest Algorithm, April 1992 |
7 | Gilles Brassard. A Note on the Complexity of Cryptography. IEEE Transactions on Information Theory, vol. IT-25, 1979, pp.232-233 |
8 | M. G. Zapata, 'Secure ad hoc on-demand distance vector (saodv) routing,' IETF MANET, Internet Draft (work in progress), 2001 |
9 | K. Wrona, 'Distributed security: Ad hoc networks & beyond,' in Proceedings of the Pampas Workshop 02, September 2002 |
10 | T. Okamoto and S. Uchiyama, 'A new public-key cryptosystem as secure as factoring', in Advances in Cryptology - EUROCRYPT'98, ed. K. Nyberg, LNCS 1403, Berlin: Springer-Verlag, pp.308- 318, 1998 DOI ScienceOn |
11 | Guangjie Liu, Yuewei Dai, Zhiquan Wang, 'Breaking Predictive-Coding-Based Steganography and Modification for Enhanced Security,' International Journal of Computer Science and Network Security, Vol. 6 No.3, pp.144-149, 2006.03 |