최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지 = Journal of KIISE, v.43 no.10, 2016년, pp.1094 - 1103
남춘성 (성균관대학교 컨버젼스연구소) , 정현희 (성균관대학교 전자전기컴퓨터공학과) , 신동렬 (성균관대학교 정보통신대학)
Physical Web and Eddystone can be serviced by a single integrated application on the device by using their servers' URL. However, they have a limitation that their servers must be customized for service characteristics on a case by case basis. In other words, regardless of the service selected for B...
D.Y.Kim, S.H.Kim, at el., "Internet of Things Technology and Development Direction," KICS, Journal of Information and Communication, Vol. 28, No. 9, pp. 49-57. Sept. 2011. (in Korean)
C.S.Pyo, H.Y.Kang. at el., "IoT(M2M) Technology Trends and Development Prospects," KICS, Journal of Information and Communication, Vol. 30, No. 8, pp. 3-10. Sept. 2013. (in Korean)
Andy Cavallini "iBeacons Bible 2.0" [Online] Available: https://meetingofideas.files.wordpress.com/2014/06/ibeacon-bible-2-0.pdf (downloaded 2016, Aug. 4)
"Beacon, emerging as a critical infrastructure location-based services," Communication promation bureau Media industry promation department, Trend and prospect: broadcast.communication.propagation, No. 73, pp. 30-40, Apr. 2014.
"Bluetooth core specification," [Online]. Available : https://www.bluetooth.com/specifications/bluetoothcore-specification
"Eddystone Protocol Specification," [Online]. Available: https://github.com/google/eddystone
H.Jung, H.S.Kim, "Secure Hash-Based Password Authentication Protocol Using Smartcards," Proc. of ICCSA 2011 LNCS 6786, pp. 593-606, 2011.
H.Jung, H.S.Kim, "Smartcard-Based User Authentication Protocol over Home Network," Proc. of Future Information Technology, Application, and Service, Vol. 164, pp. 181-189, 2012.
C.G.Ma, D.Wang, S.D.Zhao, "Security flaws in two improved remote user authentication schemes using smart cards," International Journal of Communication Systems, Vol. 27, pp. 2215-2227, Nov. 2012.
"Physical Web Project," [Online]. Available: http://google.github.io/physical-web/
"Physical Web Github," [Online]. Available: https://github.com/google/physical-web
G.H.Woo, "Using Guide of Google's Physical Web," communications protocols Lab, Kyungpook University, Dec 2014. [Online]. Available: http://protocol.knu.ac.kr/tech/CPL-TR-14-06-Physical-Web.pdf (downloaded 2016, Aug. 4)
G.K.Muhammad, M.F.Sheik, I.Y.Chong, "WoO Based IoT Service Provisioning with the Cooperation of Physical Web," Proc. of KCC 2015, pp. 1179-1181, Jun. 2015.
S.J.Kim, D.E.Cho, "Technology Trends for IOT Security," The Journal of the Korea Contents Association, Vol. 13, No. 1, pp. 31-35, Korea, Mar. 2015. (in Korean)
H.Jung, D.R.Shin, K.S.Cho, C.S.Nam, "BLE-OTP Authorization Mechanism for iBeacon Network Security," Journal of KIISE, Vol. 42, No. 8, pp. 979-989, Seoul, Korea, Aug. 2015.
M. Mrissa, L. Medini, Jean-Paul Jamont, N. le sommer, J. Laplac, "An Avatar Architecture for the Web of Things," IEEE Internet Computing, Vol. 16, Apr. 2015.
A. Freier, P. Karlton, P. Kocher, "The Secure Sockets Layer (SSL) Protocol Version 3.0," Request for Comments 6101, Aug 2011. [Online]. Available: https://tools.ietf.org/html/rfc6101 (downloaded 2016, Aug. 4)
E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.3," Request for Comments (Internet-Draft), Dec 2015. [Online]. Available: https://tools.ietf.org/html/draft-ietf-tls-rfc5246-bis-00 (downloaded 2016, Aug. 4)
S.W.Kim, Y.W.Lim, H.K.Lim, "Security and Future Direction on Physical Web," Proc. of KIIT Summer Conference, pp. 326-328, Jun. 2015. (in Korean)
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.