1 |
이창조,김상복 "차세대 사이버 인증 보안을 위한 알고리즘의 설계 및 구현에 관한 연구", 한국사이버테러정보전학회, 정보.보안 논문지, 제6권 제3호 pp.69-78, 2006.
|
2 |
Naomaru Itoi, Tomoko Fukuzawa, Peter Honeyman, "Secure Internet Smartcards", 2000.
|
3 |
Imprimerie Nationale : Projet de Loi de Finances pour 1995, Etat de la Recherche et du Developpe onent Technologique, Paris, 1994.
|
4 |
Qinzheng Kong, Graham Chen, Rubina Y. Hussain, "A Management Framework for Internet Services", Citr Technical Journal Vol.3. pp 47-55.
|
5 |
James D. Allen, Patrick T. Gaughan, David E. Schimmel, and S. Yalamanchili, "Ariadne -an adaptive router for fault- tolerant mulicomputers," Proceedings 23st Int'l Symp. on Computer Architecture, pp. 278-288, April. 1994.
|
6 |
J. Duato, P. Lopez, F. Silla and S. Yalamanchili, "A high performance router Architecture for interconnection networks," 1996 International Conference on Parallel Processing, pp. 61-68, 1996.
|
7 |
Marcus J.Ranum, "Thinking About Firewalls", Proceedings of Second International Conference on Systems and Network Security and Management, April, 1993.
|
8 |
M. Chatel, "Classicial versus Transparent IP Proxies", RFC:1919, Mar. 1996.
|
9 |
N.haller and C.Metz, "A One-Time Password System", IETF RFC 1938, 1996.
|
10 |
Phil Karn, Neil M.Haller, and John S.Walden, Bellcore, S/Key software kit, available via anonymous FTP from thumper.bellcore.com: /pub/nmh/skey/*.
|
11 |
Stephen T. Kent, "Internet Privacy Enhanced Mail(PEM)", Communications of the ACM, Aug ust, 1993.
|
12 |
ANSI X9.62, The Elliptic Curve Digital Signature Algorithm(ECDSA), Draft Standard, 1997.
|
13 |
Winfield Treese and Alec Wolman, "X Through the Firewall, and Other Application Relays, "Cambridge Research Lab. Technical Report 93/10, Digital Equipment Corporation, May 3, 1993.
|
14 |
Akyildiz I. F, J. Mcnair, J. Ho, H. Uzunalioglu, W. Wang, "Mobility Management in Current and Future Communications Networks," IEEE Network, July/August 1998.
|
15 |
Elnahas A, N. Adly, "Location Management Techniques for Mobile Systems," Information Sciences, 130, 1-22, 2000.
DOI
|