메뉴 건너뛰기




Volumn 4, Issue 3, 2009, Pages 69-75

Addressing new security threats

Author keywords

[No Author keywords available]

Indexed keywords

ASYMMETRIC ENCRYPTION; CONFIGURATION ATTACK; CORE NETWORKS; DIGITAL SIGNATURE; DISPERSED SYSTEMS; HARDWARE SECURITY; HASH VALUE; MACHINE-TO-MACHINE COMMUNICATIONS; PHYSICAL ATTACKS; PROTOCOL ATTACKS; SECURITY THREATS; TRUST RELATIONSHIP; WIRELESS COMMUNICATIONS;

EID: 70249090090     PISSN: 15566072     EISSN: None     Source Type: Journal    
DOI: 10.1109/MVT.2009.933478     Document Type: Article
Times cited : (85)

References (16)
  • 1
    • 70249091695 scopus 로고    scopus 로고
    • Study on facilitation of machine-to-machine communication in 3GPP systems
    • 3rd Generation Partnership Project (3GPP) Mar.
    • 3rd Generation Partnership Project (3GPP). (2007, Mar.). Study on facilitation of machine-to-machine communication in 3GPP systems. 3GPP Tech. Rep. 22.868, version 8.0.0 [Online]. Available: ftp:// ftp.3gpp.org/Specs/ archive/22-series/22.868/22868-800.zip
    • (2007) 3GPP Tech. Rep. 22.868, Version 8.0.0 [Online]
  • 2
    • 84869633168 scopus 로고    scopus 로고
    • Feasibility study on remote management of USIM application on M2M equipment
    • 3rd Generation Partnership Project (3GPP) May
    • 3rd Generation Partnership Project (3GPP). (2007, May). Feasibility study on remote management of USIM application on M2M equipment. 3GPP Tech. Rep. 33.812, unpublished draft version 1.4.0 [Online]. Available: ftp://ftp.3gpp.org/tsg-sa/WG3-Security/TSGS3- 55-Shanghai/Docs/S3-091154.zip
    • (2007) 3GPP Tech. Rep. 33.812, Unpublished Draft Version 1.4.0 [Online]
  • 8
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum, "Security without identification: Transaction systems to make big brother obsolete," Commun. ACM, vol. 28, no. 10, pp. 1030-1044, 1985.
    • (1985) Commun. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 10
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • A.-R. Sadeghi and Ch. Stüble, "Property-based attestation for computing platforms: Caring about properties, not mechanisms," in Proc. 2004 Workshop on New Security Paradigms NSPW '04, 2004, pp. 67-77
    • (2004) Proc. 2004 Workshop on New Security Paradigms NSPW '04 , pp. 67-77
    • Sadeghi, A.-R.1    Chen, L.2
  • 12
    • 84869623707 scopus 로고    scopus 로고
    • TNC architecture for interoperability
    • Trusted Computing Group (TCG), Revision 6 [Online]
    • Trusted Computing Group (TCG). (2006). TNC architecture for interoperability. TCG Specification Version 1.3, Revision 6 [Online]. Available: http://www.trustedcomputinggroup.org/resources/tnc-architecture-for- interoperability-version-1 3
    • (2006) TCG Specification Version 1.3
  • 13
    • 84869609906 scopus 로고    scopus 로고
    • TCG infrastructure work ing group, architecture-Part II-Integrity management
    • Trusted Computing Group (TCG), Revision 1.0 [Online]
    • Trusted Computing Group (TCG). (2008). TCG infrastructure work ing group, architecture-Part II-Integrity management. TCG Specifi cation Version 1.0, Revision 1.0 [Online]. Available: http://www. trustedcomputinggroup.org/ resources/infrastructure-work-group- architecture-part-ii integrity-management- version-10
    • (2008) TCG Specification Version 1.0


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.