共 50 条
- [1] The efficient security architecture for authentication and authorization in the home network [J]. ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2007, : 713 - +
- [2] Security architecture for authentication and authorization in the intelligent and ubiquitous home network [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2007, 2 : 1110 - +
- [3] Authentication and authorization for network security service [J]. SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 84 - 88
- [4] Device Authentication/Authorization Protocol for Home Network in Next Generation Security [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 760 - +
- [5] Smart Environment Authentication: Multi-Domain Authentication, Authorization, Security Policy for Pervasive Network [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 99 - 104
- [6] A Security Framework for IoT Authentication and Authorization based on Blockchain Technology [J]. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 264 - 271
- [7] Security service framework for home network [J]. FOURTH ANNUAL ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2005, : 233 - 238
- [9] The security framework for home network environments [J]. ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 382 - 385
- [10] A Framework for Improved Home Network Security [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 114 - 123