메뉴 건너뛰기




Volumn , Issue , 2013, Pages 429-434

Secured communication between mobile devices and smart home appliances

Author keywords

home appliances; home security; mobile devices; smart home; smartphone

Indexed keywords

DOMESTIC APPLIANCES; INTELLIGENT BUILDINGS; MOBILE COMPUTING; MOBILE TELECOMMUNICATION SYSTEMS; SECURITY SYSTEMS; SMARTPHONES; UBIQUITOUS COMPUTING;

EID: 84904164851     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAT.2013.90     Document Type: Conference Paper
Times cited : (8)

References (14)
  • 6
    • 84904174916 scopus 로고    scopus 로고
    • Accessed on 18 October
    • P. John-Paul (2013). Hacking Smart Homes. Retrieved from http://www. symantec. com/connect/blogs/hacking-smart-homes. Accessed on 18 October 2013.
    • (2013) Hacking Smart Homes 2013
    • John-Paul, P.1
  • 7
    • 84904212646 scopus 로고    scopus 로고
    • htm. Accessed on 18 October
    • A. Sharma (2013). ACS Unveils New Security Solutions for Smart Devices. Retrieved from http://www. tmcnet. com/channels/mobiledevice-management/ articles/355479-Acs-unveils-new-security-solutionssmart-devices. htm. Accessed on 18 October 2013.
    • (2013) ACS Unveils New Security Solutions for Smart Devices 2013
    • Sharma, A.1
  • 8
    • 84904197765 scopus 로고    scopus 로고
    • Accessed on 26 October
    • D. Palmer (2012). What is Bluetooth? Retrieved from http://www. techradar. com/news/phone-And-communications/mobilephones/ what-is-bluetooth- 1063913. Accessed on 26 October 2013.
    • (2013) What Is Bluetooth 2012
    • Palmer, D.1
  • 9
    • 84904200728 scopus 로고    scopus 로고
    • Accessed on 26 October
    • TJ Prebil (2012). Security Threats & Embedded Devices. Retrieved from http://www. netop. com/inside-service/security-threats-embeddeddevices/. Accessed on 26 October 2013.
    • (2013) Security Threats & Embedded Devices 2012
    • Prebil, T.J.1
  • 11
    • 81755180685 scopus 로고    scopus 로고
    • Secure public key exchange against man-in-The-middle attacks during secure simple pairing (ssp) in bluetooth
    • IDOSI Publications
    • I. ALMomani, M. Al-Saruri, M. Al-Akhras, "Secure Public Key Exchange Against Man-in-The-Middle Attacks During Secure Simple Pairing (SSP) in Bluetooth, " World Applied Sciences Journal 13 (4), pp. 769-780, IDOSI Publications, 2011
    • (2011) World Applied Sciences Journal , vol.13 , Issue.4 , pp. 769-780
    • Almomani, I.1    Al-Saruri, M.2    Al-Akhras, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.