1 |
EU, European Commission -Press release, Retreived Apr., 12, 2012, from http://europa.eu.
|
2 |
S. K. Yoo, Y. G. Hong, and H. J. Kim, "Smart mobile services - M2M technology and its standardization trends," J. ETRI, vol. 26, no. 2, Apr. 2011.
|
3 |
D. Guinard, A web of things application architecture-integrating the real-world into the web, Retrieved Dec, 1, 2012, from http://www.webofthings.org.
|
4 |
Z. Shelby, K. Hartke, and C. Bormann, "Constrained application protocol (CoAP)," IETF CoRE WG draft, Apr., 2013.
|
5 |
O. G.-Morchon, S. L. Keoh, S. S. Kumar, R. Hummen, and R. Struik, "Security considerations for the IoT," IETF CoRE WG draft, Mar., 2013
|
6 |
Z. Lan and Z. Huaibei, "An improved approach to security and privacy of RFID application system," in Proc. Int. Conf. Wireless, Commun., Networking and Mobile Comput., vol. 2, pp. 1195-1198, Wuhan, China, Sep. 2005.
|
7 |
KISA, "Research for Random number generator using a domestic cipher algorithm," KISA-WP-2011-0039, 2011
|
8 |
M. Son and N. Kang, "Design and implementation of Java crypto provider for Android platform," J. KICS, vol. 37C, no. 9, pp. 851-858, Sep. 2012.
과학기술학회마을
DOI
ScienceOn
|