최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국통신학회논문지. The Journal of Korea Information and Communications Society. 통신이론 및 시스템, v.29 no.12C, 2004년, pp.1692 - 1706
김석매 (충북대학교 컴퓨터과학과) , 김장환 (대덕대 IT계열) , 이충세 (대덕대 컴퓨터과학과)
Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment i...
Dan Boneh, 'The decision Diffie-Hellman problem', in Proc. Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1423, Springer-Verlag, pp. 48-63, 1998
Dan Bonehy Matthew Franklin, 'Identity-based encryption from the Weil Pairing', extended abstract in Advances in Cryptology-Crypto 2001, Lecture Notes in Computer Science, Vol.2139, Sprmger-Verlag, pp. 231-229, Aug. 2001
Dan Boneh, Ben Lynn, Hovav Shacham, 'Short signatures from the Weil pairing', in Advances in Cryptology-AsiaCrypt 2001, Lecture Notes in Computer Science, Vol. 2248, Springer-Verlag, pp. 514-532, 2001
Tim Dierks and Christopher Allen, 'The TLS Protocol Version 1.0' IETF RFC 2246, January 1999
Whitfield Diffie and Martin E. Hellman, 'New Directions in Cryptography' IEEE Transactions on Informations Theory, Vol, IT-22, No 6, pp.472-492, Nov,1976
WAP Fourm, 'Wireless Application Protocol Wireless Transport Layer Security Spectification version 18-FEB-2000', 2000
Jeyanthi Hall, Susan Kilbank, Michel Barbeau and Evangelos Kranakis, 'WPP: A Secure Payment Protocol for Supporting Credit-card and Debit-card Transactions Over Wireless Networks,' IEEE International Conference on Teleconununications (ICT), Bucharest, June, 2001
Gunter Horn, Bart Preneel, 'Authentication and Payment in Future Mobile Systems,' ESORICS, LNCS 1485,pp.277-293, 1998
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, 'Handbook of Applied Cryptography' CRC Press, October 16, 1996, ISBN: 0849385237
Keith M. Martin , Bart Preneel , Chris J Mitchell , Hans-Joachim Hitz , $G\ddot unther$ Horn, A. Poliakova , P. Howard, 'Secure Billing for Mobile Information Services in UMTS', Proceedings of the 5th International Conference on Intelligence and Services in Networks:Technology for Ubiquitous Telecom Services, p.535-548, May 25-28, 1998
Divya Nalla, and K.C.Reddy, 'ID-based tripartite Authenticated Key Agreement Protocols from pairings' available at http://eprint.iacr.org/2003/004.pdf
Pekka Niskanen and Jukka Heika 'Inside WAP : Programming Applications with WML and WMLScript'Addison-Wesley, 2000
Tatsuaki Okamoto and David Pointcheval 'The gap-problems: a new class of problems for the security of cryptographic Schemes, Proc. of PKC '01, Lecture Nores in Computer Sciences,Vol. 1992, pp. 104-118, Springer-Verlag, 2001
Nigel P. Smart, 'An Identity based authenticated Key Agreement Protocol based on the Weil pairing', Cryptology ePrint Archive, Report 2001/111,2001. http://eprint.iacr.org/
Adi Shamir 'Identity based cryptosystems and signature schemes' Advances in Cryptology Proceedings of Crypto'84, pp.47-57
이동훈, 임채훈, 'TLS와 WTLS의 비교 분석', (주)퓨처시스템 암호체계센터 기술보고서, Oct.2000
이만영, 김지홍, 류재철, 송유진, 염흥렬, 이임영, '전자상거래 보안 기술', 생능출판사, 1999
이병래, 장경아, 김태윤 '3세대 이동통신을 위한 티켓 기반 인증 및 지불 기법' 정보과학회논문지: 정보통신 제29권 제4호, 2002.8
이상곤, 윤태은 'EC - KCDSA 부분 은닉서명을 이용한 거스름 재사용 가능한 전지수표지불시스템' 한국정보보호학회논문지 제13권 제1호, 2003. 2
조유근, 'SET 프로토콜을 위한 안전하고 효율적인 지불 게이트웨이의 설계 및 구현', 서울대학교 석사논문, 2000년 2월
한대완, 이동훈, 황상철, 류재철 'WISA2002에 제안된 무선 전자 지불 시스템의 안전성' 정보보호학회 논문지 13권 6호 2003.12
※ AI-Helper는 부적절한 답변을 할 수 있습니다.