참고문헌
- Mark Weiser. The Computer for the 21 Centry. Scientific American. Vol. 256. No.3. pp. 94-104. Sep. 1991
- 정보통신부, 'U-센서 네트워크 구축 기본계획' 2004.2.17
- H. Abrach, S.Bhatt, J.Charlson, H. Dui. Rose, A. Sheth, B. Shucker, J. Deng, R. Han, 'MANTIS: System Support for Multimodal Network of In- Situ Sensors', In Proc. of 2nd Workshop on Wireless Sensor Networks and Applications (WSNA' 03), San Diego, CA, Sep, 2003
- B.j.Bonfils, P. Bonnet, 'Adaptive and Decentralized Operator Placement for In-Network Query Processing', IPSN'03, April, 2003, LNCS 2634
- H. Han, A. Perrig, D. Song, 'Random Key Predistribution Schemes for Sensor Networks', Appears in IEEE Symposium on Security and Privacy 2003
- K. S. J. Pister, J, M Kahn, and B. E. Boser. Smart dust : Wireless networks of millimeter-scale sensor nodes, 1999
- http://www.citris.berkeley.edu/index.html
- A. Perrig, R. Szewczyk, J.D.Tygar, Victorwen D. E. Culler : SPINS : 'Security Protocols for Sensor Networks, Wireless Networks' 8, 521.534, 2002
- Diameter CMS Security Application, draft-i etf-aaa-diameter-cms-sec-04.txt, www.ietf.org/html.charters/aaa-charter. html
- Adrian Perrig, Ran Canetti, Dawn Song and Doug Tygar. 'Efficient and secure source authentication for multicast. In Network and Distributed System security symposium, NDSS '01, February 2001
- Steven Bellovin and Michael Merrit. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In First ACM Conference on Computer and Communications Security. CCS-1, Pages 244-250, 1993
- D. Harkins and D. Carrel. The internet key exchange(IKE). Request for Comments 2409, Information Sciences Institute, University of Southern California, November 1998
- Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer Security, 28:270-299,1984
- R.L. Rivest.'The RC-5 Encryption algorithm. Proc. 1st Workshop on Fast Software Encryption, Pages 86-96,1995
- U.S National Institute of Standards and Technology (NIST). DES model of operation. Federal Information Processing Standards Publication 81(FIPS PUB 81)
- R. Gennaro and P. Rohatgi. 'How to sign digital streams. In Burt Kaliski, editor, Advances in Cryptology-Crypto '97, Pages 180-197, Berlin, 1997. Springer-Verlag. Lecture Notes in Computer Science Vol. 1294
- Pankaj Rohatgi. A compact and fast hybrid signature scheme for multicast packet authentication. In 6th ACM Conference on Computer and Communications Security, November 1999
- Donggang Liu, Peng Ning 'Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks' E-mail : dliu@unity.ncsu.edu
- A.Perrig, and J.T.D.S.R. Canetti, Briscoe. TESLA: Multicast source authentication transform. IRTF draft, draftirtf- smug-tesla-00.txt, November 2000
- 조영섭, 조상래, 유인태, 진승헌, 정교일 : 유비 쿼터스 컴퓨팅과 보안 요구사항 분석, 정보보호학회지, 2004. 2
- 주학수, 권현조, 강달천, 윤재호, 박배효, 전길수, 이재일 : RFID/USN정보보호 위협