최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.23 no.2, 2022년, pp.9 - 17
김상곤 (Dept. of Electronics & Information Engineering, Korea University) , 김태곤 (Dept. of Electronics & Information Engineering, Korea University)
In this paper, we propose a secure smart home network model and a novel cryptographic protocol called the Smart Home Security Protocol (SHSP). Authentication, key distribution, and encryption functions are properly supported in order to make a smart home secure, and a residential gateway (RG) plays ...
W. Choi, J. Kim, S. Lee, E. Park, "Smart home and internet of things: A bibliometric study," Journal of Cleaner Production, vol. 301, 126908, June, 2021. https://doi.org/10.1016/j.jclepro.2021.126908
X. Wang and Z. Jin, "An Overview of Mobile Cloud Computing for Pervasive Healthcare," in IEEE Access, vol. 7, pp. 66774-66792, May, 2019. https://doi.org/10.1109/ACCESS.2019.2917701
P. Janson and G. Tsudik, "Secure and minimal protocols for authenticated key distribution," Computer Communications, vol. 18, Issue 9, pp. 645-653, Sep., 1995. https://doi.org/10.1016/0140-3664(95)99807-O
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, "Systematic design of a family of attack-resistant authentication protocols," IEEE Journal on Selected Areas in Communications, Vol. 11, Issue 5, pp. 679-693. 1993. https://doi.org/10.1109/49.223869
R. Needham, M. Schroeder, "Using encryption for authentication in large networks of computers," Comm. of the ACM, Vol, 21, Issue 12, pp. 993-999. Dec., 1978. https://doi.org/10.1145/359657.359659
Wacks, "Home systems standards: achievement and challenges," IEEE Communications Magazine, Vol. 40, Issue 4, pp. 152-159, April 2002. https://doi.org/10.1109/35.995865
T. Zahariadis, K. Pramataris, N. Zervos, "A comparison of competing broadband in-home technologies," Elect. and Comm. Eng. Journal, Vol. 14, Issue 4, pp. 133-142, Aug., 2002. https://doi.org/10.1049/ecej:20020401
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, "The KryptoKnight family of authentication and key distribution protocols," IEEE/ACM Trans. on Netw., March 1995.
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, "The KryptoKnight family of light-weight protocols for authentication and key distribution," IEEE/ACM Trans. Netw., Vol. 3, Issue 1, pp. 31-41, 1995. https://doi.org/10.1109/90.365435
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.