Acknowledgement
Grant : All-IP 융합 네트워크 구축을 위한 유선-LTE-WiBro-B4G 망 통합용 단일 제어체계 액서스 시스템 기술개발
Supported by : MKE
References
- Pay-Buy-Mobile Business Opportunity Analysis - Public White Paper, GSMA, Nov. 2007.
- Global M-Payment Update 2005, Arthur D. Little, 2006
- The Mobile Internet Report, Morgan Stanley, Dec. 2009.
- Measuring the Information Society - The ICT Development Index, International Telecommunication Union(ITU), 2009
- Best Practice for Mobile Financial Services, Mobey Forum, 2008
- R. Sundarraj and J. Wu, 'Using Information-Systems Constructs to Study Online- and Telephone-banking Technologies," Electronic Commerce Research and Applications, vol. 4, Jul. 2005.
- S. Barnes and B Corbitt, "Mobile Banking: Concept and Potential," International Journal of Mobile Communications, vol. 1, Sep. 2003.
- T. Dierks, The Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC 5246, August 2008.
- SSL, http://en.wikipedia.org/wiki/Secure_Sockets_Layer
- P. Eronen, "IKEv2 Mobility and Multihoming Protocol (MOBIKE)", IETF RFC4555, June. 2006.
- WTLS, "Wireless Transport Layer Security Protocol Specification," WAP Forum, http://www.wapforum.org/, Nov. 1999.
- E. Rescorla, A.Schiffman, "The Secure HyperTextTransfer Protocol," August 1999, IETF RFC 2660.
- B. Ramsdell, S/MIME Version 3 Message Specification, Jun. 1999, IETF RFC 2633.
- R. Moskowitz and P. Nikander, Host Identity Protocol (HIP) Architecture, RFC 4423, May 2006.
- D. Farinacci, et aI., Locator/ID Separation Protocol (LISP), draft-farinacci-lisp-07.txt, April 2008
- R. Atkinson, INLP Concept of Operations, Internet-draft, August 2009
- Erik P. Harris et aI., "Technology Directions for Portable Computers," Proceedings of the IEEE, 636-658, April 1995.
- J. Arkko, V. Devarapalli, and F. Dupont, Using IPsec to protect mobile IPv6 signaling between mobile nodes and home agents, IETF RFC 3776, Jun. 2004.
- G. O'shea and M. Roe, "Child-proof authentication for MlPv6(CAM)," ACM Computer Communication Review, vol. 31, no. 2, 2001
- Y. Qiu, J. Zhou, and F. Bao, "Protecting all traffic channels in mobile IPv6 network," IEEE Wireless Communications and Networking Conf., pp. 100-165, Mar. 2004.
- Password-authenticated key exchange(PAK) protocol, ITU-T Rec. X.1035, 2007.
- C. Kaufman, Internet key exchange(IKEv2) protocol, IETF RFC 4306, Dec. 2005.
- S. Kent, Security Architecture for the Internet Protocol, IETF RFC 4301, Dec. 2005.
- S. Kent, IP authentication header, IETF RFC 4302, Dec. 2005.
- S. Kent, "IP encapsulating security payload(ESP)", IETF RFC 4303, Dec. 2005.
- D. Eastlake and P. Jones, US secure hash algorithm 1(SHA1), IETF RFC 3174, Sep. 2001.
- D. Eastlake, J. Schiller, and S. Crocker, Randomness requirements for security, IETF RFC 4086, Jun. 2005.
- E. -J. Yoon, E. -K. Ryu, and K. -Y. Yoo, "An improvement of Hwang-Lee-Tang's simple remote user authentication scheme," Computer & Security, vol.24, pp.50-56, 2005. https://doi.org/10.1016/j.cose.2004.06.004
- Wireshark, http://www.wireshark.org
- 김소이, "전자금융사고 발생유형 및 대응현황", 금융결제원, 지급결제와 정보기술 제38호, pp.34-62, 2009년 10월.
- 김영진 외, "U-정보사회에서의 포괄적 네트워크 보안관리 방안," 정보보호학회지, v.18, no.3, pp.74-80, 2008년 6월.
- 이원철 외, "전자금융거래시스템 취약점 분석 및 안전성 강화방안 연구," 정보보호학회지, v.15, no.4, pp.44-49, 2005년 8월.
- 주영도 외, "랜덤 Nonce 기반 사용자 인증 스킴의 안전성 개선에 관한 연구," 한국산업정보학회논문지, v.15, no.3, pp.33-40, 2010년 9월.
- 이승익, "SBC 기반 차세대 이동형 단말기 개발," 한국산업정보학회논문지, v.14, no.4, pp.30-36, 2009년 12월.
Cited by
- Dynamic Dependability Level Switching Strategies by Utilizing Threat Predictions vol.22, pp.2, 2017, https://doi.org/10.9723/jksiis.2017.22.2.015