1 김성민 ; 노병희, "콘텐츠 중심 네트워킹에서의 그룹 기반 협력 캐싱 방법" 한국엔터프라이즈아키텍처학회 14 (14): 357-366, 2017
2 안효춘 ; 고영배 ; 노병희, "전술 네트워크의 C2&SA 유통 능력기반평가 모델 연구" 한국엔터프라이즈아키텍처학회 14 (14): 129-137, 2017
3 박한솔 ; 조완섭, "대중교통 빅데이터의 다차원 네트워크 분석기법" 한국엔터프라이즈아키텍처학회 13 (13): 139-145, 2016
4 Rao IRSN, "Wireless secured data trans-mission using cryptographic techniques through fpga" 2016
5 Jemimah J, "Web based biometric validation using biological identities: an elaborate survey" IEEE 1-6, 2018
6 Mangard, S., "Power analysis attacks: Revealing the secrets of smart cards (Vol. 31)" Springer Science & Business Media 2008
7 길준호 ; 이규민 ; 이승운 ; 노병희, "Operation Scheme of Aerial Relay Networks for Improving Degree of Situation Awareness in Future Tactical Networks" 한국엔터프라이즈아키텍처학회 15 (15): 509-520, 2018
8 Diffie W, "New directions in cryptography" 22 (22): 644-654, 1976
9 Madhusudhan R, "Mobile user authentication protocol with privacy preserving forroaming service in glomonet" 1-22, 2019
10 Ahmed K, "Increasing robustness of data encryption standard by integrating dnacrypto-graphy" 39 (39): 91-105, 2017
1 김성민 ; 노병희, "콘텐츠 중심 네트워킹에서의 그룹 기반 협력 캐싱 방법" 한국엔터프라이즈아키텍처학회 14 (14): 357-366, 2017
2 안효춘 ; 고영배 ; 노병희, "전술 네트워크의 C2&SA 유통 능력기반평가 모델 연구" 한국엔터프라이즈아키텍처학회 14 (14): 129-137, 2017
3 박한솔 ; 조완섭, "대중교통 빅데이터의 다차원 네트워크 분석기법" 한국엔터프라이즈아키텍처학회 13 (13): 139-145, 2016
4 Rao IRSN, "Wireless secured data trans-mission using cryptographic techniques through fpga" 2016
5 Jemimah J, "Web based biometric validation using biological identities: an elaborate survey" IEEE 1-6, 2018
6 Mangard, S., "Power analysis attacks: Revealing the secrets of smart cards (Vol. 31)" Springer Science & Business Media 2008
7 길준호 ; 이규민 ; 이승운 ; 노병희, "Operation Scheme of Aerial Relay Networks for Improving Degree of Situation Awareness in Future Tactical Networks" 한국엔터프라이즈아키텍처학회 15 (15): 509-520, 2018
8 Diffie W, "New directions in cryptography" 22 (22): 644-654, 1976
9 Madhusudhan R, "Mobile user authentication protocol with privacy preserving forroaming service in glomonet" 1-22, 2019
10 Ahmed K, "Increasing robustness of data encryption standard by integrating dnacrypto-graphy" 39 (39): 91-105, 2017
11 VijayaKumar P, "Enhanced level of security using dna computing-technique with hyperelliptic curve cryptography" 4 (4): 1-, 2013
12 Raju P, "Dna encryption based dual server password authentication" Springer 29-37, 2015
13 Singh H, "Dna based cryptography : an approach to secure mobile-networks" 1 (1): 77-80, 2010
14 Pelzl J, "CHES" Springer 351-365, 2003
15 Jiang Q, "An enhanced authentication scheme with privacy preservation forroaming service in global mobility networks" 68 (68): 1477-1491, 2013
16 Ha J, "An efficient and robust anonymous authentication scheme in global mobility networks" 9 (9): 297-312, 2015
17 ElGamal T, "Advances in cryptology" Springer 10-18, 1984
18 Misbahuddin M, "A secure image-based authentication scheme employing dna cryptoand steganography" ACM 595-601, 2015
19 Karuppiah M, "A secure authentication scheme with user anonymity for roamingservice in global mobility networks" 84 (84): 2055-2078, 2015
20 Madhusudhan R, "A secure and lightweight authentication scheme for roaming service inglobal mobile networks" 38 : 96-110, 2018
21 Zhao D, "A secure and effective anonymous authentication scheme forroaming service in global mobility networks" 78 (78): 247-269, 2014
22 Xu G, "A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks" 107 : 83-92, 2018
23 Madhusudhan, R., "A novel DNA based password authentication system for global roaming in resource-limited mobile environ-ments" 79 (79): 2185-2212, 2020
24 Koblitz N, "A family of jacobians suitable for discrete log cryptosystems" Springer 94-99, 1990
25 Pheng Un Lim ; 최창열 ; 최황규, "A Scalable and Efficient Live Video Streaming Over DHT Overlay Network" 한국엔터프라이즈아키텍처학회 13 (13): 509-520, 2016