최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of the convergence on culture technology : JCCT = 문화기술의 융합, v.9 no.4, 2023년, pp.639 - 647
A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new techn...
Hussain Shaikh, Jong-Ho Kim, "Factor Analysis?of IoT Relative Advantages with TAM Model",?Journal of Next-generation Convergence Technology?Association, Vol. 6, No. 2, pp. 193-201, 2022.?https://doi.org/10.33097/JNCTA.2022.06.02.193
Ji-Yeon Lee, "A Study on Cloud Service?Certification Approach from SaaS Security?Perspective", Journal of Next-generation Convergence?Technology Association, Vol. 6, No .10, pp. 1820-1830, 2022. https://doi.org/10.33097/JNCTA.2022.06.10.1820
Fatma Alshohoumi, Mohammed Sarrab, Abdulla?AlHamadani, and Dawood Al-Abri. "Systematic?Review of Existing IoT Architectures Security?and Privacy Issues and Concerns", International?Journal of Advanced Computer Science and?Applications, Vol. 10, No. 7, pp. 232-251, 2019.?DOI: 10.14569/IJACSA.2019.0100733.
Young-Sae Kim and JeongNyeo Kim. "A?Performance Analysis of Lightweight Cryptography?in IoT Devices", The 28th Joint Conference on?Communications and Information, pp. 327-328,?2018
Caiming Liu, Yan Zhang and Huaqiang Zhang.?"A Novel Approach to IoT Security Based on?Immunology", Ninth International Conference on?Computational Intelligence and Security, pp.?771-775, 2013.
Kai Zhao and Lina Ge. "A Survey on the?Internet of Things Security, Ninth International?Conference on Computational Intelligence and?Security", pp. 663-667, 2013.
Xiong Li, Zhou Xuan and Liu Wen. (2011)?Research on the Architecture of Trusted?Security System Based on the Internet of?Things", 2011 Fourth Internal Conference on?Intelligent Computation Technology ad Automation,?1172-1175.
Mamun Abu-Tair, Soufiene Djahel, Philip Perry,?Bryan Scotney, Unsub Zia, Jorge Martinez?Carracedo and Ali Sajjad. "Towards Secure and?Privacy-Preserving IoT Enabled Smart Home:?Architecture and Experimental Study", Sensors.?Vol. 20, No. 21., pp. 6131, 2020. doi:10.3390/s20216131.
A. Juels. P. Syverson. and D. Bailey, "High?Power Proxies for Enhancing RFID Privacy and?Utility, Center for High Assurance Computer?Systems", CHACS, LNCS Vol. 3856, pp. 210-226, 2015. DOI:10.1007/11767831_14
M. Rieback. B. Crispo. and A. Tanenbaum.?RFID Guardian, "A Battery Powered Mobile Device?for RFID Privacy Management", Australasian?Conference on informaiton Security and Privacy?(ACISP) LNCS 3574, 184-194, 2015.
Moon-si Hoon, Min-woo Kim and Tae-kyung?Kwon, "Technology Trend of Ultra-weight En?cryption for IoT Communication Surroundings",?Korean Institute of Communications and Infor?mation Sciences. Information and Communications?Magazine. Vol. 33, No. 3, pp. 80-86, 2016.
Dongkoo Kim and Hyeal Lee. "Implementation?of Hardware and Trend of Ultra Encryption?Algorithm", IDEC WEBZIN,http://www.idec.or.kr/webzine/?news_id20191102.2019.
Mohammad Abdur Razzaque, Marija Milojevic-Jevric, Andrei Palade and Siobhan Clarke.?"Middleware for Internet of Things: A Survey:,?IEEE Internet of Things Journal. Vol. 3, No. 1,?pp. 70-95, 2016. DOI: 10.1109/JIOT.2015.2498900
Antonio F. Skarmeta, Jose L. Hernandez Ramos?and M. Victoria Moreno. "A Decentralized?Approach for Security and Privacy Challenges in?the Internet of Things", IEEE World Forum on?Internet of Things, pp. 67-72, 2014.
Seminar Materials, "IoT Security Authentication?Criteria Test, Case Study Top7", KISA, 2020.9.18.
Mouza Bani Shemaili, Chan Yeob Yeun, Khalid?Mubarak, Mohamed Jamal Zemerly, "A New?Lightweight Hybrid Cryptographic Algorithm for?The Internet of Things", The 7th International?Conference for Internet Technology and Secured?Transaction, 87-92, 2012.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.