1 |
ZigBee Alliance Document 03522 : Security Service Specification, December 2004
|
2 |
이지홍,하인수,김인식,'PCS와 원칩 마이크로콘트롤러를 이용한 원격검침 시스템,' 2000년도 대한전자공학회 하계종합학술대회 논문지 제23권 제1호, pp. 171-174, 2000
과학기술학회마을
|
3 |
박종연,조호찬,최승지,'전력선 통신과 공중 전화망에 의한 전력량의 원격 검침 시스템의 개발,' 2002년도 대한전자공학회 하계종합학술대회 논문지 제25권 제1호, pp. 311-314, 2000
과학기술학회마을
|
4 |
Messerges T. et al, 'A Security Design for a General Purpose, Self-organizing, Multihop Ad Hoc Wireless Network,' MITSUBISHI ELECTRIC RESEARCH LABORATORIES TR2003-114, December 2004
|
5 |
유병익, 임정미, 유선영, 박창섭, '이중 해쉬체인에 기반을 둔 Link-State 라우팅 보안 매커니즘,' 한국정보보호학회 논문지 제13권 제2호, 2003
과학기술학회마을
|
6 |
Chartwell, 'The Chartwell AMR Report 2003 8th Edition, October 2003
|
7 |
PLC포럼 디지털 가전위원회,'Home Network Control Protocol (HNCP)PreSpec. Ver.1.0,' PLC 포럼, 2002
|
8 |
기술표준원,'고속 전력선통신(PLC) 국가표준(KS)공청회,' 2006
|
9 |
V. Shoup, 'Practical Threshold Signatures,' Proceedings of EUROCRYPT '00, Springer-Verlag, Lecture Notes in Computer Science 1807, pp. 207-220, May 2000
|
10 |
Yih-Chum Hu, Adrian Perrig, David B. Johnson, 'Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,' Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom '02), September 2002
|
11 |
Xinjun Du Ying Wang Jianhua Ge Yumin Wang, 'A Method for security Enhancements in AODV Protocol,' Proceedings of the 17 th International Conference on Advanced Information Networking and Applications (AINA '03), March 2003
DOI
|
12 |
J. Staddon, S. Miner, and M. Franklin, 'Self-Healing Key Distribution with Revocation,' Proceedings of 2002 IEEE Symposium on Security and Privacy (S&P2002), May 2002
DOI
|
13 |
Haiyun Luo, Petros Zefros, Jiejun Kong, Songwu Lu, and Lixia Zhang, 'Self-securing Ad Hoc Wireless Networks,' 7th IEEE Symposium on Computers and Communications (ISCC '02), July 2002
DOI
|
14 |
Frank Staiano, Ross Anderson, 'The Resurrecting Duckling : Security Issues in Ad-Hoc Wireless networks,', Security Protocols, 7th International Workshop Proceedings
DOI
ScienceOn
|
15 |
Konrad Wrona, 'Distributed Security: Ad Hoc Networks & Beyond,' Ad Hoc Network Security PAMPAS Workshop, September 2002
|
16 |
L. Zhou and Z. J Haas, 'Securing Ad Hoc Networks,' IEEE Network Magazine, vol. 13, pp. 24-30, November/December 1999
DOI
ScienceOn
|
17 |
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, 'Providing robust and ubiquitous security support for mobile ad-hoc networks,' Proceedings of International Conference on Network Protocols (ICNP '01), November 2001
|
18 |
Frank Stajano, 'The Resurrecting Duckling: What Next?,' Security Protocols, 7th International Workshop Proceedings, Springer-Verlag, Lecture Notes in Computer Science, April 2000
|