1 |
Kyoung-nam Kim, Lee, Jae Moon, MyounJae Lee, Sunghyuck Hong, Convergent Secure Wireless Sensor Network Routing Algorithm. Journal of the Korea Convergence Society, Vol. 6, No. 1, pp. 65-70, 2015.
DOI
|
2 |
Yang, M. H., and Hu, H. Y., Protocol for ownership transfer across authorities: with the ability to assign transfer target, Security and Communication Networks, vol .5, pp. 164-177, 2012.
DOI
|
3 |
G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. D. Johnson, M2M: from mobile to embedded internet., IEEE Communications Magazine, vol. 49, no. 4, pp. 36-43, 2011.
DOI
|
4 |
S. Y. Lien, K. C. Chen, and Y. Lin, Toward ubiquitous massive accesses in 3GPP machineto- machine communications. IEEE Communications Magazine, vol. 49, no. 4, pp. 66-74, 2011.
DOI
|
5 |
W. S. Bae, Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code. Wireless Personal Communications An International Journal, Vol.79, No.4, pp.2295-1609, 2014.
|
6 |
M. S. Han, W. S. Bae, Security Verification of a Communication Authentication Protocol in Vehicular Security System. Journal of Digital Convergence, Vol. 12, No. 8, pp. 229-234, 2014.
DOI
|
7 |
W. S. Bae, Inter-device Mutual authentication and Formal Verification in M2M Environment. Journal of Digital Convergence, Vol. 12, No. 9, pp. 219-223, 2014.
DOI
|
8 |
Bo-Kyung Lee, A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services. Journal of the Korea Convergence Society, Vol. 5, No. 4, pp. 93-99, 2014.
DOI
|
9 |
Keun-Ho Lee, A Study of Security Requirement in Wireless Charging. Journal of the Korea Convergence Society, Vol. 5, No. 3, pp. 23-27, 2014.
DOI
|
10 |
Eui-Seok Nahm, Design of Computer Hardware Fault Detector using ROM BIOS. Journal of the Korea Convergence Society, Vol. 4, No. 3, pp. 21-26, 2013.
DOI
|
11 |
G. Lowe., Casper:A compiler for the analysis of security protocols. User Manual and Tutorial. Version 1.12, 2009.
|
12 |
C. Kraetzer, Modelling Watermark Communication Protocols using the CASPER Modelling Language. Proceedings of the 12th ACM workshop on Multimedia and security. pp. 107-116, 2010.
|
13 |
Oxford University Computing Laboratory. FDR2 User Manual, 19th, October, 2010.
|
14 |
Yu Tian-tian, Feng Quan-yuan, A Security RFID Authentication Protocol Based on Hash Function. IEEC09, pp. 804-807, 2009.
|
15 |
Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica, Formal Verification of G-PAKE Using Casper/FDR2-Securing a Group PAKE Protocol Using Casper/FDR2. SECRYPT 2010: pp. 299-303, 2010.
|
16 |
ETSI, Machine to Machine Communications (M2M); M2M functional architecture. ETSI, TS 102 690, DEC, 2011.
|