참고문헌
- International Telecommunication Union (ITU), Security Architecture for Open Systems Interconnection for CCIT Applications, Recommendation ITU-T X.800, ITU, Geneva, 1991
- International Organization for Standardization (ISO), Information Processing Systems - Open Systems Interconnection - Part 2: Security Architecture, ISO/IEC 7498-2, ISO, Geneva, 1989
- Akyildiz, I.F., Wang, X. and Wang, W., 'Wireless Mesh Networks: A Survey,' Computer Networks Journal (Elsevier), Vol. 47, pp. 445-487, March 2005 https://doi.org/10.1016/j.comnet.2004.12.001
- W.Steven Conner, Jan Kruys, Kyeongsoo Kim, Juan Carlos Zuniga, 'IEEE 802.11s Tutorial; Overview of the Amendment for Wireless Local Area Mesh Networking.' IEEE 802 Plenary, November 2006
- IEEE Standard 802.11i, 'Wireless LAN Medium Access Control and Physical Layer specification: Medium Access Control (MAC) Security Enhancements,' July. 2004
- RFC 3748, 'Extensible Authentication Protocol(EAP),' June 2004
- IEEE 802.l x, 'IEEE Standard for Local and Metropolitan area networks-Port-Based Network Access Control,' 2001
- Avesh K. Agarwal, Wenye Wang, 'On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility,' Springer Mobile Network Application, Vol. 12, pp. 93-110, November 2006
- Stedano M. Faccion, Carl W Ijting, Jarkko Kneckt, Ameya Damle, 'Mesh WLAN Networks: Concept and System Design,' IEEE Wireless communication, Vol. 13, pp. 10-17, April, 2006 https://doi.org/10.1109/MWC.2006.1632476
- Kimaya Sanzgiri, Daniel Laflamme, Bridget Dahill, 'Authenticated Routing for Ad hoc Networks,' In journal on Selected Areas in Communication, Vol. 23. pp. 598-610, March 2005 https://doi.org/10.1109/JSAC.2004.842547
- Yih-Chun Hu, David B. Johnson, Adrian Perrig, 'Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,' In proceedings of the 4th IEEE workshop on Mobile Computing Systems and Application, Vol. I, pp.175-192, July 2003
- Atul Puri, Xuemin Chen. Ajay Luthra, 'Video coding using the H.264/MPEG-4 AVC compression standard,' Signal Processing: Image Communication Vol. 19, No. 99, pp. 793-839, October 2004 https://doi.org/10.1016/j.image.2004.06.003
- L.Tang, 'Methods for Encrypting and Decrypting MPEG Video Data Efficiently,' Proceeding of ACM International Multimedia Conference and Exhibition, pp. 219-229, Noberber 1996
- Guang Ming Hong. Chun Yuan, Yi Wang, Yu Shuo Zhong, 'A Quality Controllable Encryption for H.264/ AVC Video Coding,' Advances in Multimedia Information Processing PCM 2006, Vol. 2461, pp. 510-517, October 2006
- Tuo Shi, Brian King, and Paul Salama, 'Selective Encryption for H.264/ AVC Video Coding,' the Society of Photo-Optical Instrumentation Engineers, Vol. 6072, pp. 461-469, Feb, 2006
- Chui Sian Ong, Klara Nahrstedt and Wanghong Yuan, 'Quality of Protection for mobile multimedia Application,' in ICME 2003, Vol.2, pp. 137-140, July 2003
- Martin Prangl, Tibor Szkaliczki, Hermann Hellwagner, 'A Framework for Utility-Based Multimedia Adaptation,' IEEE Trans. on circuits and systems for video technology, Vol. 17, pp. 719-728, June 2007 https://doi.org/10.1109/TCSVT.2007.896650