1 |
L. Kagal, T. Finin, and A. Joshi, 'Trust-bas-ed security in pervasive computing environ-merits,' IEEE Computer, Vol. 34 Issue 12, pp. 154-157, Dec. 2001
DOI
ScienceOn
|
2 |
C. R. Davis, IPSec: Securing VPNs, McGraw-Hill, 2001
|
3 |
B. Miller, T. Nixon, C. Tai, and M. Wood, 'Home networking with Universal Plug and Play,' IEEE Communications magazine, Vol. 39, Issue 12, pp. 104-109, Dec. 2001
DOI
ScienceOn
|
4 |
D. Harkins, D. Carrel, 'The Internet Key Exchange,' RFC 2409, Nov. 1998
|
5 |
R. Lea, S. Gibbs, A. Dara-Abrams, and E. Eytchison, 'Networking home entertainment devices with HAVi,' IEEE Computer, Vol. 33, Issue 7, pp. 35-43, Sep. 2000
DOI
ScienceOn
|
6 |
R. Gupta, S. Talwar, and D. Agrawal, 'Jini home networking: a step toward pervasive computing,' IEEE Computer, Vol. 35, Issue 8, pp. 34-40, Aug. 2002
DOI
ScienceOn
|
7 |
H. Krawczyk, 'SKEME: a versatile secure key exchange mechanism for Internet,' IEEE Proc. of the Symposium on Network and Distributed System Security, 1996
|
8 |
W. Stallings, Cryptography and Network Security, 2nd Edition, Prentice-Hall, 1999
|
9 |
G. Caronni, H. Lubich, A. Aziz, T. mark-son, R. Skrenta, 'SKIP-Securing the Internet,' Proc. of the Fifth Workshop on Enabling Technologies, (WET ICE '96), IEEE Computer Society Press, 1996
|
10 |
H. X. Mel, D. Baker, Cryptography Decrypted, Addison-Wesley, 2001
|
11 |
A. Aziz, T. markson, H. Prafullchandra, 'Simple Key-management for Internet Protocols,' http://www.skip-vpn.org/spec/SKIP.html, Apr. 1997
|
12 |
F. Stajano and R. Anderson, 'The Resurrec-ting Duckling: security issues for ubiquitous computing,' IEEE Computer, Vol. 35 Issue 4, pp. 122-126, Apr. 2002
DOI
|
13 |
B. Schneier, Applied Cryptography Decrypted, Wiley, 1996
|
14 |
S. Ungar, 'Home network security,' In Proc. IEEE 4th Int. Workshop on Networked Appliances, pp. 41-48, 2002
|
15 |
J. Yoo, D. Lee, 'Pervasive Home Network for User Centered environment,' Technical Report of KJIST, KJIST-DIC-TR-2002-OO1 2002
|