1 |
Ground Tactical C4I system User Guideline, DAPA, pp. 1-2-2-3, 2007
|
2 |
Ajou Univ TNRC, "Wireless Network Security Structure & Invation Search/Reaction Technology Research", JCS, pp. 63-78, 2008.
|
3 |
D. E. Denning and L. Scott, "Geo-Encryption: Using GPS to Enhance Data Security," GPS World, Apr, 2003.
|
4 |
A. Al-fugaha and O. Al-Ibrahim, "Geo-encryption Protocol for Mobil Networks, "Computer Communications, vol. 30, Issue 11-12, pp. 2510-2517, Sep, 2007.
DOI
|
5 |
Hsien-Chou Liao Yun-hsiang Chao, "A New Data Encryption Algorithm Based on the Location of Mobile Users", Information Technology Yournal, 7(1), pp. 63-69, 2008.
DOI
|
6 |
Tactical Information Communications Network Operational guide book, Army HQ, pp. 2-3-3-7, 2006.
|
7 |
Tactical Information Communications Network Operation FM reference 1-2, Army HQ, pp. 2-2 6-27, 2015.
|