-
1
-
-
85013802585
-
Gartner says 4.9 billion connected " things" will be in use in 2015
-
November
-
Gartner, "Gartner Says 4.9 Billion Connected " Things" Will Be in Use in 2015," Gartner Newsroom, November 2014.
-
(2014)
Gartner Newsroom
-
-
Gartner1
-
2
-
-
84964399843
-
Proofpoint uncovers Internet of Things (IoT) cyberattack
-
January
-
Proofpoint, "Proofpoint Uncovers Internet of Things (IoT) Cyberattack," Proofpoint Release, January 2014.
-
(2014)
Proofpoint Release
-
-
Proofpoint1
-
3
-
-
84953273645
-
Remote exploitation of an unaltered passenger vehicle
-
August
-
C. Miller and C. Valaek, "Remote Exploitation of an Unaltered Passenger Vehicle," Black Hat USA, August 2015.
-
(2015)
Black Hat USA
-
-
Miller, C.1
Valaek, C.2
-
4
-
-
84891678795
-
Automating configuration system and protocol for next-generation home appliances
-
December
-
E.-S. Lee, H.-J. Lee, K. Lee, and J.-H. Park, "Automating Configuration System and Protocol for Next-Generation Home Appliances," ETRI Journal, vol. 35, no. 6, pp. 1094-1104, December 2013.
-
(2013)
ETRI Journal
, vol.35
, Issue.6
, pp. 1094-1104
-
-
Lee, E.-S.1
Lee, H.-J.2
Lee, K.3
Park, J.-H.4
-
5
-
-
84887052339
-
Wireless sensor network and stochastic models for household power management
-
August
-
F.J. Bellido-Outeirino, J.M. Flores-Arias, M. Linan-Reyes, E.J. Palacios-Garcia, and J.J. Luna-Rodriguez, "Wireless Sensor Network and Stochastic Models for Household Power Management," IEEE Transactions on Consumer Electronics, vol. 59, no. 3, pp. 483-491, August 2013.
-
(2013)
IEEE Transactions on Consumer Electronics
, vol.59
, Issue.3
, pp. 483-491
-
-
Bellido-Outeirino, F.J.1
Flores-Arias, J.M.2
Linan-Reyes, M.3
Palacios-Garcia, E.J.4
Luna-Rodriguez, J.J.5
-
6
-
-
84964352673
-
BADUSB - On accessories that turn evil
-
August
-
K. Nohl and J. Lell, "BADUSB - On Accessories that Turn Evil," Black Hat USA, August 2014.
-
(2014)
Black Hat USA
-
-
Nohl, K.1
Lell, J.2
-
7
-
-
84857354826
-
Closer to metal: Reverse engineering the Broadcom NetExtreme's firmware
-
October
-
G. Delugré, "Closer to metal: Reverse engineering the Broadcom NetExtreme's firmware," Hack.lu, October 2010.
-
(2010)
Hack.lu
-
-
Delugré, G.1
-
8
-
-
85051303523
-
How the NSA's firmware hacking works and why it's so unsettling
-
February
-
K. Zetter, "How the NSA's Firmware Hacking Works and Why It's So Unsettling", Wired, February 2015.
-
(2015)
Wired
-
-
Zetter, K.1
-
9
-
-
84964391522
-
Battery firmware hacking
-
August
-
C. Miller, "Battery Firmware Hacking," Defcon 19, August 2011.
-
(2011)
Defcon 19
-
-
Miller, C.1
-
11
-
-
70350192121
-
PKG-VUL: Security vulnerability evaluation and patch framework for package-based systems
-
October
-
J.-H. Lee, S.-G. Sohn, B.-H. Chang, and T.-M. Chung, "PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-based Systems," ETRI Journal, vol. 31, no. 5, pp. 554-564, October 2009.
-
(2009)
ETRI Journal
, vol.31
, Issue.5
, pp. 554-564
-
-
Lee, J.-H.1
Sohn, S.-G.2
Chang, B.-H.3
Chung, T.-M.4
-
12
-
-
84930669455
-
A novel ID-based authentication and key exchange protocol resistant to ephemeral-secret-leakage attacks for mobile devices
-
Y.-M. Tseng, S.-S. Huang, T.-T. Tsai, and L. Tseng, "A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices," International Journal of Distributed Sensor Networks, vol. 2015, Article ID 898716, 2015.
-
(2015)
International Journal of Distributed Sensor Networks
, vol.2015
-
-
Tseng, Y.-M.1
Huang, S.-S.2
Tsai, T.-T.3
Tseng, L.4
-
13
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
May
-
M. Das, A. Saxena, and V. Gulati, "A Dynamic ID-based Remote User Authentication Scheme," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629-631, May 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.1
Saxena, A.2
Gulati, V.3
-
14
-
-
84930984974
-
Securing mobile Ad Hoc networks using enhanced identity-based cryptography
-
June
-
K. Mehr and J. Niya, "Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography," ETRI Journal, vol. 37, no. 3, pp. 512-522, June 2015.
-
(2015)
ETRI Journal
, vol.37
, Issue.3
, pp. 512-522
-
-
Mehr, K.1
Niya, J.2
-
15
-
-
12344258539
-
Efficient signature generation by smart cards
-
January
-
C. Schnorr, "Efficient signature generation by smart cards," Journal of Cryptology, vol. 4, no. 3, pp. 161-174, January 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
16
-
-
84926037301
-
Secure pseudonym-based near field communication protocol for the consumer internet of things
-
February
-
D. He, N. Kumar, and J.-H. Lee, "Secure Pseudonym-based Near Field Communication Protocol for the Consumer Internet of Things," IEEE Transactions on Consumer Electronics, vol. 61, no. 1, pp. 56-62, February 2015.
-
(2015)
IEEE Transactions on Consumer Electronics
, vol.61
, Issue.1
, pp. 56-62
-
-
He, D.1
Kumar, N.2
Lee, J.-H.3
-
17
-
-
77954732460
-
On the security of an enhanced novel access control protocol for wireless sensor networks
-
May
-
P. Zeng, K. Choo, and D. Sun, "On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks," IEEE Transactions on Consumer Electronics, vol. 56, no. 2, pp. 566-569, May 2010.
-
(2010)
IEEE Transactions on Consumer Electronics
, vol.56
, Issue.2
, pp. 566-569
-
-
Zeng, P.1
Choo, K.2
Sun, D.3
|