메뉴 건너뛰기




Volumn 3, Issue , 2010, Pages

A study of information security for M2M of IOT

Author keywords

Attack; Internet of thing machine perception nodes; Internet of things; M2M; Security

Indexed keywords


EID: 78149349578     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICACTE.2010.5579563     Document Type: Conference Paper
Times cited : (35)

References (16)
  • 2
    • 78149342573 scopus 로고    scopus 로고
    • Octorber 2001. A vailable in
    • Ahola J (2001) Ambient Intelligence, ERCIM News, No 47, Octorber 2001. A vailable in: http://www.ercim.org/pubilcation/Ercim-News/enw4//intro.html.
    • (2001) Ambient Intelligence, ERCIM News , Issue.47
    • Ahola, J.1
  • 5
    • 70249091695 scopus 로고    scopus 로고
    • Study on facilitation of machine-to-machine communication in 3GPP systems
    • rd Generation Partnership Project(3GPP), Mar., version 8.0.0[Online]. Available
    • rd Generation Partnership Project(3GPP). (2007, Mar.). Study on facilitation of machine-to-machine communication in 3GPP systems. 3GPP Tech. Rep. 22,868, version 8.0.0[Online]. Available: ftp://ftp.3gpp.org/Specs/archive/ 22-series/22,868/22868-800.zip.
    • (2007) 3GPP Tech. Rep. 22,868
  • 11
    • 0022145479 scopus 로고
    • Security without identification Transaction systems to make big brotheer obsolete
    • D. Chaum, "Security without identification Transaction systems to make big brotheer obsolete," Commun. ACM, vo1.28, no 10, pp. 1030-1044, 1985.
    • (1985) Commun. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 14
    • 78149290766 scopus 로고    scopus 로고
    • Dwell on the challenges of Information Security of IOT
    • Dwell on the challenges of Information Security of IOT. http://www.wlwcy.ibicn.com/technology/archive/201004/033812581089866653097/html.
  • 16


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.