1 |
W. Rankl, and W. Effing, "Smart Card Handbook," JOHNWILEY & SONS, 2003.
|
2 |
K. Bicakci, and N. Baykal, "Infinite Length Hash Chains and Their Applications," WET ICE 2002, pp. 57-61, 2002.
|
3 |
Y. K. Lee, D. G. Lee, J. W. Han, and T. H. Kim, "Home Network Device Authentication:Device Authentication Framework and Device Certificate Profile." Computer Journal. Oxford University, July 2008.
|
4 |
M. Hirano, T. Okuda, and S. Yamaguchi, "Application for a Simple Device Authentication Framework:Device Authentication Middleware using Novel Smart Card Software," SAINT-W 2007, pp.31-34, 2007.
|
5 |
D. G. Lee, G. W. Kim, J. W. Han, Y. S. Jeong, and D. S. Park, "Smart Environment Authentication:Multi -Domain Authentication, Authorization, Security Policy for Pervasive Network," UMC' 08, pp.99-104, 2008.
|
6 |
J. P. Jeong, M. Y. Chung, and H. S. Choo, "Integrated OTP-based User Authentication Scheme Using Smart Cards in Home Networks System," HICSS 2008, pp. 294-300, 2008.
|
7 |
K. V. Nguyen. "Simplifying Peer-to-Peer Device Authentication Using Identity-Based Cryptography," ICNS' 06, pp. 43-47, 2006.
|
8 |
R. Suzuki, M. Ogawa, Y. Tobimatsu, and T. Iwaya, "Time-Course Action Analysis of Daily Life Investigations in the Welfare Techno House In Mizusawa," Telemedicine Journal and e-Health, Vol.7, 2001.
|
9 |
T. Tamura, T. Togawa, M. Ogawa, and M. Yoda, "Fully automated health monitoring system in the home," Medical Engineering & Physics, Vol.20, 1998.
|