[ASC05] Alarcos, B., Sedano, M. and Calderon, M., “Multidomain Network Based on Programmable Networks: Security Architecture,” ETRI Journal, Vol. 27, No. 6, 2005, pp. 651-65.
[Des88] Desmedt, Y., “Society and Group Oriented Cryptography,” Advances in Cryptology – CRYPTO ’87 Proceedings, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1988, pp. 120-127.
[DF90] Desmedt, Y. and Frankel, Y., “Threshold Cryptography
,” Advances in Cryptology – CRYPTO ’89 Proceedings, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1990, pp. 307-315.
[DH76] Diffie, W. and Hellman, M., “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. 22, No. 6, 1976, pp. 644-654.
[EIG85] EIGamal, T., “A Public Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms,” IEEE Transactions of Information Theory, Vol. 31, No. 4, 1985, pp. 469-472.
[Ful05] Fulton, B., “Technical and Administrative Cyber Security Issues with Implementation of A SCADA Security Upgrade,” in Process Institute Electric Engineering Seminar Security of Distributed Control Systems, 2005, pp. 61-69.
[Har94] Harn, L., “Group-Oriented ( ) Threshold Digital Signature Scheme and Digital Multisignature,” IEEE Proceedings Computer and Digital Techniques, Vol. 141, No.5, 1994, pp.307-313.
[HHJLLH07] Heo, J., Hong, C.S., Ju, S.H., Lim, Y.H., Lee, B.S. and Hyun, D.H., “A Security Mechanism for Automation Control in PLC-Based Networks,” IEEE Symposium Power Line Communications and Its Applications, 2007, pp. 466-470.
[ITU03] ITU-T Recommendation X.805, “Security Architecture for Systems Providing End-to-End Communications,” 2003.
[ITU04] ITU-T Recommendation X.1121, “Framework of Security Technologies for Mobile End-to-End Data Communications,” 2004.
[ITU05] ITU-T Recommendation J.192, “A Residential Gateway to Support the Delivery of Cable Data Services,” 2005.
[ITU07a] ITU-T Recommendation X.1111, “Framework of Security Technologies for Home Network,” 2007.
[ITU07b] ITU-T Recommendation X.1112, “Device Certificate Profile for the Home Network,” 2007.
[ITU07c] ITU-T Recommendation X.1113, “Guideline on User Authentication Mechanisms for Home Network Services,” 2007.
[ITU08] ITU-T Recommendation X.1114, “Authorization Framework for Home Networks,” 2008.
[KLHLK09] Kim, G.W., Lee, D.G., Han, J.W., Lee, S.H. and Kim, S.W., “Security Technologies Based on A Home Gateway for Making Smart Homes Secure,” Internet Research, Vol. 19, No. 2, 2009, pp. 209-226.
[LCLC08] Liao, G.Y., Chen, Y.J., Lu, W.C. and Cheng, T.C., ” Toward Authenticating the Master in the Modbus Protocol,” IEEE Transactions on Power Delivery, Vol. 23, No. 4, 2008, pp. 2628-2629.
[LJPH06] Lee, Y.K., Ju, H.I., Park, J.H. and Han, J.W., “User Authentication Mechanism Using Authentication Server in Home Network,” International Conference on Advanced Communication and Technology (ICACT), 2006.
[NIST93] National Institute of Standards and Technology, NIST FIPS PUB 180, “ Secure Hash Standard, ” United States Department of Commerce, 1993.
[RSA78] Rivest, R.L., Shamir, A. and Adleman, L.M., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, 1978, pp.120-126.
[SB07] Stallings, W. and Brown, L., Computer Security: Principles and Practice. Upper Saddle River, New Jersey, Prentice Hall, 2007.
[王楊03] 王智弘、楊淳斐,『心理衛生服務的倫理、法律、科技介面與網路安全問題』,台北:台大醫學院,2003。http://www.heart.net.tw/wang/paper/paper20040228.htm
[天11] 天碩電網科技,『智慧化數化生活』,2011。http://www.fbblife.com/25152361/article/content.aspx?ArticleID=1198
[行10] 行政院主計處,『電腦應用概況報告』,2010。http://www.dgbas.gov.tw/ct.asp?xItem=29900&CtNode=5604&mp=1
[江黃許彭陳10] 江季翰、黃世昌、許維庭、彭新福、陳進福,『用於智慧家庭以角色為基礎之情境感知應用』,第九屆離島資訊技術與應用研討會論文集,2010。
[林11a] 林俞廷,天碩電網科技,『打造一個優質的智慧家庭生活網路安全監控之居住空間』,2011。http://www.fbblife.com/25152361/article/content.aspx?ArticleID=927
[林11b] 林建安,天碩電網科技,『智慧家庭系統』,2011。http://www.fbblife.com/25152361/article/content.aspx?ArticleID=1179
[林11c] 林建安,天碩電網科技,『智慧電網-讓科技更貼近生活』,2011。http://www.fbblife.com/25152361/article/content.aspx?ArticleID=1131
[施03] 施字駿,『智慧型家庭自動化系統的整合與應用』,碩士論文,元智大學,2003。[陳06] 陳曉鋒,『基於ZigBee 無線感測網路之情境感知服務系統』,碩士論文,國立成功大學,2006。[智08a] 智慧化居住空間發展策略專屬網站,『智慧空間共同平台技術發展現況(1)』,2008。http://www.ils.org.tw/intelligent/IlsGoto.ashx?guid=D920283327074808A78C0362F2C3D586F42787B0BD5C143A35A80E0D528BF46AEFB8340C301CA954
[智08b] 智慧化居住空間發展策略專屬網站,『智慧空間共同平台技術發展現況(2)』,2008。http://www.ils.org.tw/intelligent/IlsGoto.ashx?guid=4A2D081E47D7BEE2FAB3A3C194819380D18DB250A2983EC971E7D32687D80DEAD3A86E4DB4740455
[葉05] 葉盈翰,『用於情境感知數位家庭應用之多代理人軟體平台及其環境模擬器之開發』,碩士論文,國立成功大學,2005。
[資11] 資通訊產業聯盟,『智慧家庭生活趨勢』,2011。http://www.fbblife.com/03791506/article/content.aspx?ArticleID=856
[賴韓張03] 賴溪松、韓亮、張真誠,『近代密碼學及其應用』,旗標,2003。
[謝11] 謝緯達,天碩電網科技,『智慧生活-家庭自動化』, 2011。http://www.fbblife.com/25152361/article/content.aspx?ArticleID=1178