1 |
X. Wang and Z. Jin, "An Overview of Mobile Cloud Computing for Pervasive Healthcare," in IEEE Access, vol. 7, pp. 66774-66792, May, 2019. https://doi.org/10.1109/ACCESS.2019.2917701
DOI
|
2 |
W. Choi, J. Kim, S. Lee, E. Park, "Smart home and internet of things: A bibliometric study," Journal of Cleaner Production, vol. 301, 126908, June, 2021. https://doi.org/10.1016/j.jclepro.2021.126908
DOI
|
3 |
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, "Systematic design of a family of attack-resistant authentication protocols," IEEE Journal on Selected Areas in Communications, Vol. 11, Issue 5, pp. 679-693. 1993. https://doi.org/10.1109/49.223869
DOI
|
4 |
R. Needham, M. Schroeder, "Using encryption for authentication in large networks of computers," Comm. of the ACM, Vol, 21, Issue 12, pp. 993-999. Dec., 1978. https://doi.org/10.1145/359657.359659
DOI
|
5 |
Wacks, "Home systems standards: achievement and challenges," IEEE Communications Magazine, Vol. 40, Issue 4, pp. 152-159, April 2002. https://doi.org/10.1109/35.995865
DOI
|
6 |
T. Zahariadis, K. Pramataris, N. Zervos, "A comparison of competing broadband in-home technologies," Elect. and Comm. Eng. Journal, Vol. 14, Issue 4, pp. 133-142, Aug., 2002. https://doi.org/10.1049/ecej:20020401
DOI
|
7 |
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, "The KryptoKnight family of light-weight protocols for authentication and key distribution," IEEE/ACM Trans. Netw., Vol. 3, Issue 1, pp. 31-41, 1995. https://doi.org/10.1109/90.365435
DOI
|
8 |
P. Janson, G. Tsudik, M. Yung, "Scalability and flexibility in authentication services: The kryptoKnight approach," Proceedings of INFOCOM '97, IEEE, April, 1997. https://doi.org/10.1109/INFCOM.1997.644526
DOI
|
9 |
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, "The KryptoKnight family of authentication and key distribution protocols," IEEE/ACM Trans. on Netw., March 1995.
|
10 |
P. Janson and G. Tsudik, "Secure and minimal protocols for authenticated key distribution," Computer Communications, vol. 18, Issue 9, pp. 645-653, Sep., 1995. https://doi.org/10.1016/0140-3664(95)99807-O
DOI
|