1 |
"모바일 지급결제 표준화 추진", 지식경제부, (http://www.mke.go.kr) 2011. 3. 9.
|
2 |
카인즈 (http://www.kinds.or.kr)
|
3 |
R. Anderson, "The classification of hash functions", P. G. Farrell, editor, Codes and Cyphers : Cryptography and Coding IV, Institute of Mathematics & Its Applications, pp. 83-93, 1995.
|
4 |
I. B. Damgard, "Collision free hash functions and public key signature schemes", Advances in Cryptology EUROCRYPT'87, LNCS, Vol. 304, pp. 203-216, 1988.
|
5 |
B. Preneel, "Cryptographic hash functions", European Transactions on Telecommunication Vol. 5, pp. 431-448, 1994.
|
6 |
H. Dobbertin, "Cryptanalysis of MD-4", D.Gollmann, editor, Fast Software Encryption, Third International Workshop, LNCS, Vol. 1039, pp. 71-82, Springer-Verlag, 1996.
|
7 |
M. J. Bach, "The design of the UNIX operating system", ISBN 0-13-201799-7 or ISBN 0-13-201757-1(international ed.). Prentice-Hall 1986.
|
8 |
M. W. Garrett, "A Service Architecture for ATM: From Applications to Scheduling", IEEE Network May/June 1996.
|
9 |
ATM Forum, "ATM User Network Interface (UNI) Specification Version 3.1", ISBN 0-13-393828-X, Prentice-Hall, Englewood Cliffs, NJ, June 1995.
|
10 |
G. C. Sacket and C. Y. Metz, "ATM and Multiprotocol Networking", ISBN 0-07-057724-2, McGraw-Hill 1997.
|
11 |
나성훈, 신현식, "VoIP 보안 관련 주요기술에 대한 분석", 한국전자통신학회논문지, 5권, 4호, pp. 385-390, 2010.
|