최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기융합정보논문지 = Journal of Convergence for Information Technology, v.10 no.11, 2020년, pp.55 - 63
박중오 (성결대학교 파이데이아학부) , 최도현 (숭실대학교 컴퓨터학과) , 홍찬기 (가톨릭관동대학교 의료IT학과)
The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, an...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
T. H Kim, J. H Hong & H. Y. Jung. (2015). Trend in Trustworthy Communication for the Next-Generation. Electronics and Telecommunications Trends, 30(4), 129-139.
T. H. J. Kim et al. (2013). Accountable key infrastructure (AKI) a proposal for a public-key validation infrastructure. In Proceedings of the 22nd international conference on World Wide Web (pp. 679-690).
Y. T. Kim. (2015.). Secure Messenger System using Attribute Based Encryption. Journal of Security Engineering, 12(5), 469-486,
S. E. Ponta, H. Plate & A. Sabetta. (2018, September). Beyond metadata: Code-centric and usage-based analysis of known vulnerabilities in open-source software. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 449-460). IEEE.
Y. Yang, L. Wu, G. Yin, L. Li & H. Zhao. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250-1258. DOI : 10.1109/JIOT.2017.2694844
Malcolm Shore. (2017). IoT Common Security Principle v1.0, KISA.
CoAP(Constrained Application Protocol), IETF(Internet Engineering Task Force, http://www.ietf.org)
L. A. Tawalbeh, F. Muheidat, M. Tawalbeh & M. Quwaider. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.
B. K. Rios & J. Butts. (2017). When IoT Attacks: understanding the safety risks associated with connected devices. Proceedings of Black Hat USA. https://www.blackhat.com/docs/us-17/wednesday/us-17-Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices.pdf
D. Y. Kang & J. H. Hwang. (2019). A Study on Priority of Certification Criteria for IoT Security Certification Service. The Journal of the Korea Contents Association, 19(7), 13-21.
Common Criteria Recognition Arrangement. (2017). Common Criteria for Information Technology Security Evaluation. Part 1 : Introduction and general model, CCMB-2017-04-001.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.