1 |
J.W. Lim, J.D. Jang, C.P. Yoon, H.B. Ryu, "Mobile Malicious AP Detection and Cut-off Mechanism based in Authentication Network", Journal of Information and Security, Vol. 12, No. 1, pp 55-61, 2012.
|
2 |
S.K. Hwang, S.J. Han, "A Study on efficient transmission performance improvement Considering the security in the wireless LAN environment", Journal of The Korea Institute of Information and Communication Engineering, Vol. 17, No. 4, pp. 837-846, 2013.
DOI
|
3 |
J.H. Park, Y.J. Kim, Y.J. Lee, J.M. Yang, "PPP CHAP Modification for Wireless Internet Access of Remote Mobile Subscriber on GPRS Network", The KIPS transactions, Part C, Vol. 9C No. 4, pp. 551-562, 2002.
DOI
|
4 |
Y.H. Ham, B.H. Chung, K. Chung, "A Study on DIAMETER IAPP Server Supporting Wireless LAN Terminal Handoff", The Journal of Korea Information and Communications Society, Vol. 28, No. 12C , pp. 1258-1267, 2003.
|
5 |
Y.H. Ham, B.H. Chung, K. Chung, "The Implementation of RADIUS Client for 802.1aa Authentication and 802.11i Key Exchange", Proceedings of The 30th KISS Spring Conference, pp. 371-373, 2003.
|
6 |
D.P. Kim, C.B. Kang, S.W. Kim, "Rogue AP Protection System Based on Radius Authentication Server", Proceedings of The 31th KISS Spring Conference, pp. 316-318, 2004.
|
7 |
Y.M. Kim, S.Y. Lim, M.C. Kang, J.B. Lee, J.H. Lim, E.Y. Ban, J.I. Han, "Design of Multi-Authentication Server for user authentication in SaaS platform", Proceedings of The 35th KISS Spring Conference, pp. 897-900, 2011.
|
8 |
R.N. Akram, K. Markantonakis, K. Mayers, "Trusted Platform Module for Smart Cards", New Technologies, Mobility and Security, Proceedings of 6th International Conference, pp. 1-5, 2014.
|