|
[1] A. S. Ali, Z. Zanzinger, D. Debose, B. Stephens, “Open Source Building Science Sensors (OSBSS): A low-cost Arduino-based platform for long-term indoor environmental data collection,”Building and Environment. Vol. 100: 114–126. 2016 [2] M.-S. Jian, Y.-C. Wang, B.-H. Wu, Y.-E. Cheng, “Hybrid Cloud Computing for User Location-aware Augmented Reality Construction,” ICACT, pp.190-194, Feb. 2018. [3] L.Xu, W.He, S.Li, “Internet of things in industries: a survey.”IEEE Trans. Ind. Inf., Vol. 10(4), pp. 2233–2243, 2014,DOI: 10.1109/TII.2014.2300753 [4] C. B. Westphall, C.MerkleWestphall, J. Werner, D. dos Santos, “Security in the Context of Internet of Things, Cloud, Fog, and Edge,”IWCSS, Dec. 2017. DOI:10.13140/RG.2.2.20008.67841 [5] B.Echandouri, C.Hanin, F.Omary, S.Elbernoussi, “LCAHASH-MAC: A new lightweight message authentication code using cellular automata for RFID,”WINCOM, pp.1-6, Nov. 2017 [6] Y.Seralathan, T. Oh, S.Jadhav, J. Myers, J.Jeong, Y. H. Kim, and J. Kim, “IoT Security Vulnerability: A Case Study of a Web Camera,”ICACT, pp.172-177, Feb. 2018. [7] M.S. Jian, J.Y. Wu, J.Y.n Chen, Y.J. Li, Y.C. Wang, H.-Y. Xu, “IoT base Smart Home Appliances by using Cloud Intelligent Tetris Switch,” ICACT, pp.589-592, Feb. 2017. [8] A. S. Ali, Z. Zanzinger, D. Debose, B. Stephens, “Open Source Building Science Sensors (OSBSS): A low-cost Arduino-based platform for long-term indoor environmental data collection,”Building and Environment. Vol. 100: 114–126. 2016 [9] Z.Yan, P. Zhang,A.V. Vasilakos, “A survey on trust management for internet of things.”J. Netw. Comput. Appl., Vol. 42, pp. 120–134, 2014,DOI: 10.1016/j.jnca.2014.01.014. [10] T.Heer, O.Garcia-Morchon, R.Hummen, S.L.Keoh, S.S.Kumar, K.Wehrle, “Security challenges in the IP-based internet of things.”J. Wirel. Pers. Communic., Vol. 61(3), pp. 527–542, 2011, DOI: 10.1007/s11277-011-0385-5. [11] B. Kamal, et al. “Software‐defined networking (SDN): a survey,”Security and Communication Networks, vol. 9 no. 18, pp. 5803-5833, Dec. 2016. [12] EPCGlobalwebsite.[Online].Available:https://www.gs1.org/epcglobal [13] M.S. Jian, H.C. Chang, J.Y. Wu, and J.Y. Chen, “Intelligent Power Switch,” R.O.C. Patent M528511, Sept. 11, 2016. [14] J. Black, M. Cochran, T. Highland: A Study of the MD5 Attacks: Insights and Improvements, 3 March 2006. Retrieved 27 July 2008. [15] ReemAlfaifi, “Probabilistic cryptosystem with two pairs of private/public keys,”ICECTA, pp.1-4, Nov. 2017. [16] DhimanSaha; DebdeepMukhopadhyay; DipanwitaRoyChowdhury. "A Diagonal Fault Attack on the Advanced Encryption Standard" (PDF). Archived (PDF) from the original on 22 December 2009. Retrieved 2009-12-08. [17] ChristofPaar, Jan Pelzl, "The Data Encryption Standard (DES) and Alternatives"[permanent dead link], free online lectures on Chapter 3 of "Understanding Cryptography, A Textbook for Students and Practitioners". Springer, 2009. [18] Delfs, Hans &Knebl, Helmut. Symmetric-key encryption. “Introduction to cryptography: principles and applications”. Springer. 2007. ISBN 9783540492436. [19] EPCGlobalwebsite.[Online].Available:https://www.gs1tw.org/twct/web/downloads/EPCglobal_Framework_v1.5.pdf [20] 各類加密表示圖:https://www.itread01.com/content/1544153222.html [21] MAC位址:https://zh.wikipedia.org/wiki/MAC%E5%9C%B0%E5%9D%80 [22] DHCP:https://zh.wikipedia.org/wiki/%E5%8A%A8%E6%80%81%E4%B8%BB%E6%9C%BA%E8%AE%BE%E7%BD%AE%E5%8D%8F%E8%AE%AE [23] EPC資料交換:http://epaper.gotop.com.tw/pdf/AEN002900.pdf [24] 自動化連線:https://zh.wikipedia.org/wiki/Nmap [25] Calderbank, Michael. The RSA Cryptosystem: History, Algorithm, Primes (PDF). 2007-08-20. [26] Ming-Shen Jian, Yu-En Cheng, Chen-Han Shen."InternetOf Things (IOT) Cybersecurity based on the Hybrid Cryptosystem", 2019 21st International Conference on Advanced Communication Technology (ICACT), 2019
|