1 |
Cheong H, Choi, "Study on IBE-based Crypto- Module Functional Architecture," 2010 Proceedings of the Korean Society for Internet Information Conference, pp. 419-422, Jeju Habitchi Resort, Jesus, Jun-25, 2010
|
2 |
Cheong H. Choi, "Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention," Journal of Korean Society for Internet Information, Vol.11, No4, Aug. 2010, pp 143-158
과학기술학회마을
|
3 |
Cheong H. Choi, "The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution," Journal of Korean Society for Internet Information, Vol.11, No6, Dec. 2010, pp 87-110
과학기술학회마을
|
4 |
Cheong H. Choi, "IBE based Mobile IP Security," Proceedings for ICONI & APIC-IST 2010, pp. 115-118, Mactan Island, Philippines, 2010-12-17
|
5 |
Torsten Braun and Marc Danzelsen, "Secure Mobile IP Communication," LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks, p. 586, IEEE Computer Society, Washington DC, USA, 2001
|
6 |
Wei Qu and Sampalli Srinivas, "IPSec-based secure wireless virtual private network," MILCOM 2002 Proceedings, Vol. 2, pp. 1107-1112, Oct. 7-10, 2002
|
7 |
Daniel B. Faria, and David R. Cheriton, "Detecting Identity-based Attacks in Wireless Networks Using Signalprints," WiSe'06, September 29, 2006, Los Angeles, California, USA. pp. 43-52
|
8 |
Craig A. Shue, Minaxi Gupta, Steven A. Myers, "IPSec: Performance Analysis and Enhancements," ICC 2007 Proceedings, IEEE 2007, pp. 1527-1532
|
9 |
Salem Itani, "Use of IPSec in Mobile IP," Report ID#20011003, The American University of Beirut, May 21, 2001
|
10 |
D. Harkins, and D. Carrel, "The Internet Key Exchange (IKE)," RFC 2409, Nov. 1998
|
11 |
S. Kent and R. Atkinson, "IP Encapsulat- ing Security Payload (ESP)," RFC 2406, Nov. 1998
|
12 |
C. Kaufman, Ed, "Internet Key Exchange (IKEv2) Protocol," RFC 4306, May 2005
|
13 |
C. Perkins and P. Calhoun, "Authentication, Authorization, and Accounting (AAA) Registration Keys for Mobile IPv4, " RFC 3957, March 2005
|
14 |
S. Vaarala and E. Klovning, "Mobile IPv4 Traversal across IPsec-Based VPN Gateways," RFC 5265, June 2008
|
15 |
H. Choi, H. Song, G. Cao and T. F. La Porta, "Mobile multi-layered IPsec," Journal of Wireless Networks, Volume 14, Issue 6, pp. 895-913, December 2008
DOI
|
16 |
G. Appenzeller and B. Lynn, "Minimal-Overhead IP Security using Identity Based Encryption," http://citeseerx.ist.psu.edu/viewdoc/doi=10.1.1.10.3124
|
17 |
K. G. Paterson, "ID-based signatures from Pairings on Elliptic Curves," http://eprint.iacr.org/2002/004.pdf
|
18 |
A. Alshamsi and T. Saito, "A Technical Comparison of IPSec and SSL," 19th International Conference on AINA 2005, 28-30 March 2005, Vol. 2, pp. 395-398
|
19 |
NCSA, "The Case for Elliptic Curve Cryptography," http://www.nsa.gov/business/prog-rams/elliptic_curve.shtml, Jan. 2013
|
20 |
Anoop MS, "Elliptic Curve Cryptography," MS Anoop - An Implementation Guide, Jan. 2007, http://www.infosecwriters.com/text_resources/pdf/Elliptic_Curve_AnnopMS.pdf
|
21 |
A. Menezes, "An introduction to pairing-based cryptography," Notes from lectures (2005) in http://www.cacr.math.uwaterloo.ca/-ajmeneze/public
|
22 |
D. Boneh (1998), "The Decision Diffie- Hellman Problem". ANTS-III: Proceedings of the Third International Symposium on Al-gorithmic Number Theory (Springer-Verlag): pp. 48-63, 1998
|
23 |
D. Boneh and Matthew Frankliny, "Identity-Based Encryption from the Weil Pairing", SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
DOI
ScienceOn
|
24 |
V. S. Miller, "The Weil Pairing, and Its Efficient Calculation," J. Cryptology (2004) 17: pp. 235-261, 2004
|
25 |
M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," Proc. First Annual Conf-erence on Computer and Communications Security, ACM, 1993
|
26 |
M. Bellare, A. Desaiy, D. Pointchevalz, P. Rogaway, "Relations Among Notions of Security for Public-Key Encryption Schemes," Advances in Cryptology, CRYPTO '98, Lecture Notes in Computer Science, Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998
|
27 |
F. Baker and P. Savola, "Ingress Filtering for Multihomed Networks," RFC 3704, March 2004
|
28 |
NSA, "Suite B Implementer's Guide to NIST SP 800-56A," http://www.nsa.gov/ia/_files/SuiteB_Implementer_G-113808.pdf, July 28, 2009
|