1 |
Wen-Quan JIN, D. H. Kim, "Implementation and Experiment of CoAP Protocol Based on IoT for Verification of Interoperability," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 14, No. 4, pp. 7-12, 2014.
|
2 |
I. k Im, J. p Jeong, "Authentication eXtention Scheme of Fast Handover for Secure NEMO-based PMIPv6 Networks ," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 13, No. 4, pp. 107-119, 2013.
DOI
|
3 |
S. T. Yoo, S. H. Oh, " OAuth-based User Authentication Framework for Internet of Things". KAIS, Vol 16, No. 11, pp.8057-8063, 2015.
|
4 |
Y. H. Lee, H. S. Kim, "Remarks on Smart Watch Security Vulnerability and Solution", JSE, Vol. 12, No. 3, pp. 191-206. 2015
DOI
|
5 |
S. T. Kim, "Wearless OS Technology Trends", TTA Special Report. Vol 154, pp44-50. 2014
|
6 |
Toorani, Mohsen. "On vulnerabilities of the security association in the IEEE 802.15. 6 standard." Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2015. 245-260.
|
7 |
Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, "Unauthorized Cross-App Resource Access on MAC OS X and iOS", May 2015
|