|
結城浩(2016.11),密碼學與比特幣原理 (初版),台北:碁峰資訊 馬克古德曼(2016.3),未來的犯罪 (初版),新北市:木馬文化 Ferguson, Niels (2005),密碼學實務(初版),台北:碁峰資訊 Donald R. Cooper, Pamela S. Schindler (2016),企業研究方法 (第十二版)。台北:美商麥格羅希爾 Robert J. Dolan (2000), Note on Marketing Strategy, Hardvard Business School, 9-598-061 Rolf H. Weber (2010), Internet of Things – New security and privacy challenges, Computer & Security Review, 26 (2010) 23-30 Bruce Ndibanje, Hoon-Jae Lee, and Sang-Gon Lee (2014), Security Analysis and Improvements of Authentication and Access Control in the Internet of Things, Sensors, 2014, 14, 14786-14805 Jungho Kang• Geunil Park • Jong Hyuk Park (2016), Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments, J Supercomput, (2016) 72:4319–4336 Jangirala Srinivas , Sourav Mukhopadhyay , Dheerendra Mishra (2017), Secure and efficient user authentication scheme for multi-gateway wireless sensor networks, Ad Hoc Networks, 54 (2017) 147–169 S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini (2015), Security, privacy and trust in Internet of Things: The road ahead, Computer Networks, 76 (2015) 146–164 Jayavardhana Gubbia, Rajkumar Buyyab, Slaven Marusic, Marimuthu Palaniswami (2013), Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems, 29 (2013) 1645–1660 Rodrigo Roman, Jianying Zhou, Javier Lopez (2013), On the features and challenges of security and privacy in distributed internet of things, Computer Networks, 57 (2013) 2266–2279 Zheng Yan, PengZhang, AthanasiosV.Vasilakos (2014), A survey on trust management for Internet of Things, Journal of Networkand Computer Applications, 42 (2014)120–134 Qi Jing, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, Dechao Qiu (2014), Security of the Internet of Things: perspectives and challenges, Wireless Netw, (2014) 20:2481–2501 ABI Research--Digital Authentication and Embedded Security Ryan P Nakamoto (2016), Secure Boot and Image Authentication Technical Overview
|