References
- 오연주, 범민준, 김동희, 백희현, "사설IP기반 홈네트워크에서 세션이동성 지원의 적응적인 SIP응용서버 시스템 구조설계," 대한임베디드공학회논문지, Vol. 1, No. 2, pp.73-81, 2006.
- D. G. Lee, J. W. Han, J. H. Park, "User Authentication for Multi Domain in Home Network Environments," Proceedings on 2007 International Conference on Multimedia and Ubiquitous Engineering(MUE'07), pp.89-96, 2007.
- G. W. Kim, D. G. Lee, J. W. Han, S. C. Kim, S. W. Kim, "Secueity Framework for Home Network:Authentication, Authorization, and Security Policy," Lecture Notes in Artificial Intelligent, Vol. 4819, pp. 621-628, 2007.
- 서화정, 김호원, "속성기반 재 암호화를 이용한 스마트카드 인증권한 분배스킴," 대한임베디드공학회논문지, Vol. 5, No. 3, pp.168-174, 2010.
- ITU-T, http://www.itu.int/ITU-T
- 이덕규, 김도우, 한종욱, "홈네트워크 보안 기술 및 표준화 동향," ETRI 전자통신동향 분석, Vol. 23, No. 4, pp.89-101, 2008.
- P. Funk, "The EAP MD5-Tunneled Authentication Protocol," draft-funk-eap-md5-tunneled- 01, 2004.
- "홈서버 중심의 홈네트워크 사용자 인증 메커니즘," TTAS.KO-12.0030.
- 이원진, 전일수, "홈네트워크 상에서 속성기반의 인증된 키교환 프로토콜," 한국정보보호학회논문지, Vol. 18, No. 5, pp.49-57, 2008.
- L. Lamport, "Password authentication with insecure communication," Communication of ACM, Vol. 24, No. 11, pp.24-30, 1981. https://doi.org/10.1145/358527.358543
- A. Kehne, J. Schonwalder, H. Langenorfer, "A nonce-based protocol for multiple authentication," ACM Operating Systems Review, Vol. 26, No. 4, pp.84-89, 1992. https://doi.org/10.1145/142854.142872
- K. Mangipudi, R. Katti, "A Secure identification and key agreement protocol with user Anonymity(SIKA)," Computers and Security Vol. 25, pp. 420-425, 2006. https://doi.org/10.1016/j.cose.2006.05.002
- A. Sahai, B. Waters, "Fuzzy identity based encryption," In Eurocypt 2005, pp. 457-473, 2005.
- M. Pirretti, P. Traynor, P. McDaniel, B. Waters, "Secure attribute-based systems," Proceedings on ACM Conference on Computer and Communications Security (CCS'06), pp.99-112, 2006.