1 |
F. Siddiqui, S. Zeadally, T. Kacem, and S. Fowler, "Zero Configuration Networking: Implementation, performance, and security," Computers & electrical engineering, vol. 38, no. 5, pp. 1129-1145, 2012.
DOI
|
2 |
iOS Security. https://www.apple.com/business/docs/site/iOS_Security_Guide.pdf (accessed Jun., 2019).
|
3 |
Bonjour Operations. https://developer.apple.comb/library/archive/documentation/Cocoa/Conceptual/NetServices/Articles/NetServicesArchitecture.html (accessed June, 2019).
|
4 |
X. Bai, et al., "Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf," 2016 IEEE Symposium on Security and Privacy (SP), pp. 655-674, San Jose, USA, 2016.
|
5 |
Y.J. Song, et al., "Analysis of Airdrop Packets and Known Vulnerabilities," Proc. of Symposium of the Korean Institute of communications and Information Sciences, pp. 987-988, June, 2018.
|
6 |
S.H. Kim, "Comparison and analysis on efficiency of scalar multiplication for Elliptic Curve Cryptosystem", M. S. dissertation, Korea Maritime and Ocean University graduate school, Busan, 2003.
|
7 |
S.h. Kwon, et al., "Simple Challenge-Response Authentication for Apple's Bonjour Protocol," Proc. of Symposium of the Korean Institute of communications and Information Sciences, pp. 989-990, June, 2018.
|
8 |
J.N. Kim, "Implementation of Virtualization-based Domain Separation Security Platform for Smart Devices," Smart Media Journal, vol. 5, no. 4, pp. 116-123, 2016.
|
9 |
W.J. Joe, H.J. Shin, and H.S. Kim, "A log visualization method for network security monitoring," Smart Media Journal, vol. 7, no. 4, pp. 70-78, 2018.
|