References
- W.-P. Kang, J.-Y. Song, K.-H. Lee, D,-H. Lee, S.-J. Jung, H.-J. Choi. "Analysis of Common Data Link Technology Trends for the Next Generation Korean Common Data Link Development", The J. of Korea Inform. and Commun. Society, vol.39C no.3, pp.209-222, March, 2014.
- E. S. Lim, "Concept of tactical data link employment and next C4ISR system," Quart, J. Defence Policy Stud., vol. 74, pp. 49-83, 2007.
- J. S. Kim, S. J. Kim, and M. Y Lim, "Overview of tactical data link technology," J. KISSE, vol. 74, no, 9, pp. 18-28, Sept. 2007.
- J. S. Eum and B. O. Ahn, "Development trends and preview point of MPI-CDL in Israel," KIDA Defense Weekly, no. 1404, Apr. 2012.
- J. M. Chung, K. C. Park, T. Y. Won, U. H.Oh, D. C. Ko, S. J. Hong, C. B. Yoon, H.Kim, and U. Y. Pak, "Standardization strategy for the image and intelligence common data link," The J. Korean Inform. Commun. Mag., vol. 28, no. 4, pp. 41-50, Apr. 2011.
- Sheila Frankel, Bernard Eydt, Les Owens, Karen Scarfone, NIST Special Publication 800-97 - Establishing Wireless Robust Security Networks: Guide to IEEE 802.11i. Feb. 2007, NIST. URL- http://nvlpubs.nist.gov/nistpubs /Legacy/SP/nistspecial-publication800-97.pdf
- https://en.wikipedia.org/wiki/Extensible_Authenticatio n_Protocol
- https://en.wikipedia.org/wiki/IEEE_802.1X
- IEEE, 802.1x-2010, http://standards.ieee.org/getie ee802/download/802.1X-2010.pdf
- Jeremy Horwitz, "A Survey of Broadcast Encryption," Jan. 2003 URL- http://xenon.stanford.edu/-horwitz/pubs/broadcast.pdf
- Du, Xinjun, et al. "An ID-based broadcast encrypti on scheme for key distribution." IEEE Transactions on broadcasting, vol 51, no.2 pp.264-266, June 2005. https://doi.org/10.1109/TBC.2005.847600
- https://libraries.docs.miracl.com/
- https://en.wikipedia.org/wiki/High-Level_Data_Link_ Control