1 |
Eun-Ok Ha, Yoon-Ho Kim, "Design and Implementation of Web-based Monitoring System for an EAI Environment", CALS/EC Vol.14, No.3, pp.2, 2009.
|
2 |
Yoon-Jin Lee, Jae-Guen lee, In-june Jo, "Enhanced Diffie-Hellman Key Distribution using Mobile-phone", International journal of maritime information and communication sciences , pp.2564-2567, Vol.134, No.12, 2009. 12.
|
3 |
Rakesh Jaiswal, "Security Concerns in EAI", Wipro Technologies, pp.3-5, 1998.
|
4 |
Chul Sur, Young-Ho Park, Kyung-Hyune Rhee, "A Multi-receiver Certificates Encryption scheme and Its Application", Journal of Korea Multimedia Society, pp.1, Vol.14, No.6, 2011.
DOI
ScienceOn
|
5 |
Wei Dai, Crypto++ 5.6.0 Benchmarks [Internet], http://www.cryptopp.com/benchmarks.html
|
6 |
Matjaz B Juric, Professional J2EE EAI, WROX, 2002
|
7 |
E. Rescorla, Diffie-Hellman Key Agreement Method, IETF RFC 2631, 1999.
|
8 |
Jeremy Westernman, "SOA today, Introduction to service-oriented Architecture, DBReview.
|
9 |
William stallings, Cryptography and Network security, Prentice Hall, 1998.
|
10 |
Jong-Hun Park "BPM and Enabling Technology", BPM Solution Korea Conference, 2004.
|
11 |
Whitfield Diffie and Martin Hellman, "New Directions in Cryptography," IEEE Transaction on Information Theory, Vol.1T-11, No.6, November, 1976.
|
12 |
Ministry of Pubic Administration and Security, Private Information Protection Law, 2012.
|
13 |
Young-Bae Kim, "A case study on the effective Enterprise Application Integration", Yonsei University, pp.8, pp.49, 2007.
|
14 |
Sung-Doke lee, Dong-Soo Han, "A Web Services based e-Business Application Integration Framework", Journal of computing science and engineering Vol.11, No.6, pp.1, 2005.
과학기술학회마을
|
15 |
Ho-Ki Nam, Sang-Min Park, Jong-Hyun Kim, Sung-Ah Jung, "The Implementation of Enterprise Application Integration System in ERP Environment", Journal of Korea Safety Management & Science, Vol.12, No.3, pp.3, 2010.
과학기술학회마을
|
16 |
하은옥, 김윤호, "EAI환경에서의 웹기반 모니터링 시스템의 설계와 구현", CALS/EC Vol.14, No.3, pp.110, 2009.
|
17 |
Kyung-Jae Ha, Cheol-Gon Moon, "Development of Web-Based mail-System using the Public-Key Encryption Algorithm", Journal of KIISE, pp.2, 2000.
|
18 |
염흥렬, "IETF공개키 기반구조 및 PKI기반 응용 표준화 동향", Journal of KIISC, Vol.14 No.2, pp.2, 2004.
|
19 |
Seung-Han Cho, Chong-sun Hwang, "Design of Key Distribution Protocol using a New Secrecy-Analysis Method", Journal of KIISE, Vol.18, No.2, pp.1, 1991.
|
20 |
Wikipedia, Key Exchange [Internet], http://en.wikipedia.org/wiki/Key_exchange
|
21 |
Ran Canetti, Hugo Krawczyk, "Analysis of key-exchange protocols and their use for building seure channels", Springer-Verlag, Eurocrypt'01, pp.453-473, 2001.
|
22 |
변진욱, "강화된 키 교환 프로토콜의 안전성 모델에 관한 연구", Journal of KIISC, Vol.20, No.2, pp.81-83, 2010. 4.
|
23 |
Seon Jong Kim, Jeong Ok Kwon, "Secure Key Exchange Protocols against Leakage of Long-term Private Keys for Financial Security Servicers", Journal of KIISC, Vol.19, No.3, pp.120-129, 2009. 6.
|