1 |
Tactical Information Communications Network Operation FM reference 1-2, Army HQ, p. 2-26-27, 2015.
|
2 |
Ajou Univ TNRC, "Wireless Network Security Structure & Invation Search/Reaction Technology Research", JCS, pp. 63-78, 2009.
|
3 |
Steven Brown, "Implementing Virtual Private Networks", McGraw-Hill, pp. 97-140, 1999.
|
4 |
H. K. Joo, "Analysis of the IPsec Internet Key Exchange (IKE) Protocol", Korean Institute of Information Security & Cryptology, vol 10, no 4, pp. 33-46, 2000.
|
5 |
S. H. Hong, "Issues and Security on IPSec : Survey", Journal of Digital Convergence, vol 12, no 8, pp. 243-248, 2014.
DOI
|
6 |
S. W. Lee, H. S. Kim and K. Y. Yoo, "A Password-based Efficient Key Exchange Protocol "The Korean Institute of Information Scientists and Engineers, vol 31, no 4, pp. 347-353, 2004.
|
7 |
M. Bellare and P. Rogaway, "The Authentication protocol for password-based authentication key exchange", Presented to IEEE P1363a, pp. 125-132, 2000
|