1 |
Dong Chen, Guiran Chang, A Survey on Security Issues of M2M Communications in Cyber-Physical Systems, KSII Transactions on Internet and Information(TIIS), Vol. 6, No. 1, pp.24-45, 2012. 1.
|
2 |
Jiafu Wan, Hehua Yan, Hui Suo, Fang Li, Advances in Cyber-Physical System Research, KSII Transactions on Internet and Information(TIIS), Vol. 5, No. 11, pp.1891-1908, 2011. 11.
|
3 |
Dae-Geun Kim, Man-Gon Park, Horizontal Integration between Cyber Physical System Based on Industry 4.0 and Manufacture Execution Systems through Middleware Building, Journal of Korea Multimedia Society, Vol. 17, No. 12, pp.1484-1493, 2014. 12.
DOI
|
4 |
Young-Sik Kim, Cyber-Physical System Security Technology Trend in IoT era, The Magazine of the IEEE, Vol. 42, No. 8, pp.16-25, 2015. 8.
|
5 |
Jae-Hyun Lim, German, Again Industry 4.0, Journal of Korea Association of Machinery Industry, Vol. 45, No. 7, Total-vol. 457, pp.34-39, 2015. 7.
|
6 |
Armin Puhringer, Impact on the existing industrial communication on the IoT and Industry 4.0, Monthly ICN, Total Vol. 105, pp 22-27, 2015. 11.
|
7 |
Ray Y. Zhong, Huajun Gong, Chen Xu, and Shaoping Lu, Physical Internet-Enabled Manufactureing Execution System for Intelligent Workshop Production, International Journal of Signal Processing, Image Processing and Pattern Recofnition, Vol. 9, No. 6, pp.121-132, 2016.
|
8 |
Ok-Jae Lee, A Design of Automatic Management System in Manufacturing Process of Semiconductor Package Elements by Using RFID, The Jorunal of The Korean Institute of Communication Science, Vol. 33, No. 8, pp.313-320, 2008. 8.
|
9 |
Zhixin Yang, Pengbo Zhang, Lei Chen, RFID-enabled indoor positioning method for a real-time manufacturing execution system using OS-ELM,
|
10 |
Francisco Almada-Lobo, The Industry 4.0 revolution and the future of Manufacturing Execution System(MES), Journal of Innovation Management, Vol. 3, No. 4, pp16-21, 2015.
|
11 |
Kwangyong Park, Youjin Song, Attribute-based Encryption Technique, REVIEW OF KIISC, Vol.20. No.2, 85-92, 2010.4
|
12 |
Jongho Moon, Younsung Choi, Dongho Won, A Secure Attribute-based Authentication Scheme for Cloud Computing, KIISE Transactions on Computing Practices, Vol. 22, No. 8, pp. 345-350, 2016. 8.
DOI
|
13 |
Hye-Joung Yoo, Attribute-Based Authenentication for Secure Cloud Computing, Journal of KIIT, No.13, No.1, pp.59-69, 2015. 1.
|
14 |
Soomi Yang, An Efficient Attribute Certficate Management Technique for Highly Distributed Environment, Jouranl of Information and Security, Vol. 5, No.1, pp.85-92, 2005.3.
|
15 |
Si-Choon Noh, A Study of DES Property, Diagnosis and How to Apply Enhanced Symmetric Key Encryption Algorithm, Jouranl of Information and Security, Vol. 12, No.4, pp.85-90, 2012. 9.
|