References
- P. T. Mitchell, Network Centric Warfare: Coalition operations in the age of US military primacy, 1th ed. New York, NY: Routledge, 2013.
- D. S. Alberts and R.E. Hayes, Power to the Edge: Command and Control in the Information Age, 1th ed. Washington DC, WA: CCRP Publication Series, 2003.
- G. C. Wang, B. S. Lee, K. J. Lim and J. Y. Ahn, "Technical Trends on Security of Control and Non-payload Communications Network for Unmanned Aircraft Systems," International Journal of Electronics and Telecommunications Research Institute, vol. 32, no. 1, pp. 82-92, Feb. 2017.
- Weatherington, Dyke, and U. Deputy, "Unmanned aircraft systems roadmap, 2005-2030." United States, Office of the Secretary of Defense, Technical Report, 2005.
- J. M. Chung, K. C. Park, T. Y. Won, U. H. Oh, D. C. Ko, S. J. Hong, C. B. Yoon, H. Kim and U. Y. Pak, "Standardization Strategy for the Image and Intelligence Common Datalink," International Journal of the Korean Information and Communication Magazine, vol. 28, no. 4, pp.41-50, Apr. 2011.
- E. Burak, E. C. A. Nail, T. Craig and M. Ken, "A 275 Gbps AES encryption accelerator using ROM-based S-boxes in 65nm," in Proceeding of the Custom Integrated Circuits Conference, California: CA, pp. 1-4, 2015.
- Y. J. Ryu and J. M. Ahn, "Research on Performance Analysis for the Long Distance Air-Ground Wideband Common Data Link," International Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 04, pp. 703-715, Apr. 2017. https://doi.org/10.7840/kics.2017.42.4.703
- F. H. Myers, "A Data Link Encryption System," in Proceeding of National Telecommunications Conference, Washington: WA, pp. 27-29, 1979.
- D. H. Lim, S. J. Lee, "Public Key Authentication using Secret Sharing and ECC for Tactical Communication Networks," Journal of Security Engineering, vol. 13, no. 6 pp. 421-438, Dec. 2016. https://doi.org/10.14257/jse.2016.12.04
- D. J. C. MacKay, Information theory, Inference and Learning Algorithms, 1th ed. Cambridge, CBG: Cambridge University Press, 2003.
- T. K. Moon, Error Correction Coding: Mathematical Methods and Algorithms, 1th ed. New Jersey, NY : John Wiley & Sons, 2005.
- N. Bruce, Y. S. Lee, W. T. Jang and H. J. Lee, "Next Generation Encryption of Enhanced Light-weight Stream Cipher for Communication Systems," International Journal of Wireless Devices and Engineering, vol. 1, no. 1, pp. 27-32, 2017.
- A. Kahate, Cryptography and network security, 3th ed, New Delhi, IN: Tata McGraw-Hill Education, 2013.
- H. J. Lee, I. S. Ko (Franz Ko), "An Intelligent Security Agent for Reliable Cipher System using PingPong," Cybernetics and Systems, vol. 39, no. 7, pp.705-718, Oct. 2008. https://doi.org/10.1080/01969720802257949
- H. R. Kim, H. J. Lee, D. H. Kwon, U. Y. Pak, "A SES Alarmed Link Encryption Synchronization Method for High-speed Video Data Encryption," Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 12, pp.2891-2898, Dec. 2013. https://doi.org/10.6109/jkiice.2013.17.12.2891