최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.32 no.2, 2022년, pp.51 - 58
지장현 ((주)스마트엠투엠 하드웨어 보안팀) , 박우정 ((주)스마트엠투엠 하드웨어 보안팀) , 문재근 ((주)스마트엠투엠 하드웨어 보안팀)
Global IoT market size grew 22% in 2021 - these 16 factors affect the growth trajectory to 2027 (IoT Analytics , Available online) : https://iot-analytics.com/iot-market-size/(30 Mach 2022).
Mahmoud, Rwan, et al. "Internet of things (IoT) security: Current status, challenges and prospective measures." 2015 10th international conference for internet technology and secured transactions (ICITST). IEEE, 2015.
Khairi, Anjum, et al. "A Critical Analysis on the Security Concerns of Internet of Things (IoT)." Perception 111 (2015).
Dhanda, Sumit Singh, Brahmjit Singh, and Poonam Jindal. "Lightweight cryptography: a solution to secure IoT." Wireless Personal Communications 112.3 (2020): 1947-1980.
Purohit, Kamlesh C., et al. "Hybrid approach for securing IoT communication using authentication and data confidentiality." 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall). IEEE, 2017.
Banerjee, Utsav, et al. "An energy-efficient re-configurable DTLS cryptographic engine for End-to-End security in iot applications." 2018 IEEE International Solid-State Circuits Conference-(ISSCC). IEEE, 2018.
Muzammal, Syeda M., Raja Kumar Murugesan, and N. Z. Jhanjhi. "A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches." IEEE Internet of Things Journal 8.6 (2020): 4186-4210.
Kothmayr, Thomas, et al. "A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication." 37th Annual IEEE Conference on Local Computer Networks-Workshops. IEEE, 2012.
AWS Cloud HSM 주요 기능 : https://aws.amazon.com/ko/cloudhsm/features/.
Uskov, Alexander, Adam Byerly, and Colleen Heinemann. "Advanced Encryption Standard Analysis with Multimedia Data on Intel® AES-NI Architecture." International Journal of Computer Science &Applications 13.2 (2016).
RISC-V Resource-Constrained Cores: A Survey and Energy Comparison
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.