1 |
WTLS, "Wireless Transport Layer Security Protocol Specification," WAP Forum, http://www.wapforum.org/, Nov. 1999.
|
2 |
E. Rescorla, A.Schiffman, "The Secure HyperTextTransfer Protocol," August 1999, IETF RFC 2660.
|
3 |
B. Ramsdell, S/MIME Version 3 Message Specification, Jun. 1999, IETF RFC 2633.
|
4 |
R. Moskowitz and P. Nikander, Host Identity Protocol (HIP) Architecture, RFC 4423, May 2006.
|
5 |
D. Farinacci, et aI., Locator/ID Separation Protocol (LISP), draft-farinacci-lisp-07.txt, April 2008
|
6 |
R. Atkinson, INLP Concept of Operations, Internet-draft, August 2009
|
7 |
Erik P. Harris et aI., "Technology Directions for Portable Computers," Proceedings of the IEEE, 636-658, April 1995.
|
8 |
J. Arkko, V. Devarapalli, and F. Dupont, Using IPsec to protect mobile IPv6 signaling between mobile nodes and home agents, IETF RFC 3776, Jun. 2004.
|
9 |
G. O'shea and M. Roe, "Child-proof authentication for MlPv6(CAM)," ACM Computer Communication Review, vol. 31, no. 2, 2001
|
10 |
Y. Qiu, J. Zhou, and F. Bao, "Protecting all traffic channels in mobile IPv6 network," IEEE Wireless Communications and Networking Conf., pp. 100-165, Mar. 2004.
|
11 |
Password-authenticated key exchange(PAK) protocol, ITU-T Rec. X.1035, 2007.
|
12 |
C. Kaufman, Internet key exchange(IKEv2) protocol, IETF RFC 4306, Dec. 2005.
|
13 |
S. Kent, Security Architecture for the Internet Protocol, IETF RFC 4301, Dec. 2005.
|
14 |
S. Kent, IP authentication header, IETF RFC 4302, Dec. 2005.
|
15 |
Pay-Buy-Mobile Business Opportunity Analysis - Public White Paper, GSMA, Nov. 2007.
|
16 |
Global M-Payment Update 2005, Arthur D. Little, 2006
|
17 |
The Mobile Internet Report, Morgan Stanley, Dec. 2009.
|
18 |
Measuring the Information Society - The ICT Development Index, International Telecommunication Union(ITU), 2009
|
19 |
Best Practice for Mobile Financial Services, Mobey Forum, 2008
|
20 |
R. Sundarraj and J. Wu, 'Using Information-Systems Constructs to Study Online- and Telephone-banking Technologies," Electronic Commerce Research and Applications, vol. 4, Jul. 2005.
|
21 |
김소이, "전자금융사고 발생유형 및 대응현황", 금융결제원, 지급결제와 정보기술 제38호, pp.34-62, 2009년 10월.
|
22 |
주영도 외, "랜덤 Nonce 기반 사용자 인증 스킴의 안전성 개선에 관한 연구," 한국산업정보학회논문지, v.15, no.3, pp.33-40, 2010년 9월.
|
23 |
이승익, "SBC 기반 차세대 이동형 단말기 개발," 한국산업정보학회논문지, v.14, no.4, pp.30-36, 2009년 12월.
|
24 |
Wireshark, http://www.wireshark.org
|
25 |
E. -J. Yoon, E. -K. Ryu, and K. -Y. Yoo, "An improvement of Hwang-Lee-Tang's simple remote user authentication scheme," Computer & Security, vol.24, pp.50-56, 2005.
DOI
ScienceOn
|
26 |
김영진 외, "U-정보사회에서의 포괄적 네트워크 보안관리 방안," 정보보호학회지, v.18, no.3, pp.74-80, 2008년 6월.
|
27 |
이원철 외, "전자금융거래시스템 취약점 분석 및 안전성 강화방안 연구," 정보보호학회지, v.15, no.4, pp.44-49, 2005년 8월.
|
28 |
S. Kent, "IP encapsulating security payload(ESP)", IETF RFC 4303, Dec. 2005.
|
29 |
D. Eastlake and P. Jones, US secure hash algorithm 1(SHA1), IETF RFC 3174, Sep. 2001.
|
30 |
D. Eastlake, J. Schiller, and S. Crocker, Randomness requirements for security, IETF RFC 4086, Jun. 2005.
|
31 |
S. Barnes and B Corbitt, "Mobile Banking: Concept and Potential," International Journal of Mobile Communications, vol. 1, Sep. 2003.
|
32 |
T. Dierks, The Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC 5246, August 2008.
|
33 |
SSL, http://en.wikipedia.org/wiki/Secure_Sockets_Layer
|
34 |
P. Eronen, "IKEv2 Mobility and Multihoming Protocol (MOBIKE)", IETF RFC4555, June. 2006.
|