ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0231 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2013-12-18 ÃÑ ÆäÀÌÁö 30
ÇÑ±Û Ç¥ÁØ¸í ¹«¼± ·£¿¡¼­ ¹«¼± µð¹ÙÀ̽º ½Äº°À» À§ÇÑ ±â´É ¿ä±¸ »çÇ×
¿µ¹® Ç¥Áظí Functional Requirements for Wireless Device Identification in WLAN
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â ¹«¼± ·£¿¡¼­ÀÇ MAC ÁÖ¼Ò À§Á¶ °ø°Ý ±â¹ÝÀÇ º¸¾È À§ÇùÀ» ºÐ¼®Çϰí, ¹«¼± µð¹ÙÀ̽º»ó¿¡¼­ ³ªÅ¸³ª´Â µ¶Æ¯ÇÑ Æ¯Â¡À» ±â¹ÝÀ¸·Î ÇÏ´Â ¹«¼± µð¹ÙÀ̽º ½Äº° ±â´É¿¡ ´ëÇÑ ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard analyzes MAC spoofing-based security threats in WLAN and defines functional requirements for the wireless device identification that is a way to identify a wireless device by using distinctive characteristics exhibited by the device.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0231.pdf TTAK.KO-12.0231.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¹«¼± ·£¿¡¼­ ¹«¼± µð¹ÙÀ̽º ½Äº°À» À§ÇÑ ±â´É ¿ä±¸ »çÇ× TTAK.KO-12.0231 2013-12-18 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0231.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2017-06-09 À¯Áö ¥ï ¹«¼±·£ ȯ°æ¿¡¼­ ¸ð¹ÙÀÏ µð¹ÙÀ̽ºÀÇ À§º¯Á¶ °ø°ÝÀ¸·Î ¾ß±âµÇ´Â º¸¾È À§ÇùÀ» ¹æ¾îÇϱâ À§ÇÑ Ç¥ÁØÀ¸·Î½á Ç¥ÁØÀ¯Áö°¡ ÇÊ¿äÇÔ