- 요약
- ABSTRACT
- Ⅰ. 서론
- Ⅱ. 포그 컴퓨팅
- Ⅲ. 포그 컴퓨팅 보안 및 프라이버시 이슈
http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
https://www.riss.kr/link?id=A102701768
2017
Korean
567
KCI등재
학술저널
257-267(11쪽)
0
0
상세조회0
다운로드목차 (Table of Contents)
참고문헌 (Reference)
1 I. Dacosta, "Trust no one else : Detecting MITM attacks against SSL/TLS without third-parties" 2012
2 X. Liu, "Traffic-aware multiple mix zone placement for protecting location privacy" 972-980, 2012
3 T. Dierks, "The transport layer security (TLS)protocol version 1.2, RFC 5246"
4 P. Hoffman, "The dns-based authentication of named entities (DANE)transport layer security (TLS) Protocol: TLSA, RFC 6698"
5 P. Mell, "The NIST Definition of Cloud Computing" NIST Special Publication 800-145, 2011
6 D. K. Smetters, "Talking to strangers : authentication in Ad-Hoc wireless networks" 2002
7 V. Bindschaedler, "Synthesizing plausible privacy-preserving location traces" 2016
8 D. Kim, "Security for IoT service" 30 (30): 53-59, 2013
9 Q. Zheng, "Secure and efficient proof of storage with deduplication" 1-12, 2012
10 G. Irazoqui, "S $A: A shared cache attack that works across cores and defies VM sandboxing--and its application to AES" 591-604, 2015
1 I. Dacosta, "Trust no one else : Detecting MITM attacks against SSL/TLS without third-parties" 2012
2 X. Liu, "Traffic-aware multiple mix zone placement for protecting location privacy" 972-980, 2012
3 T. Dierks, "The transport layer security (TLS)protocol version 1.2, RFC 5246"
4 P. Hoffman, "The dns-based authentication of named entities (DANE)transport layer security (TLS) Protocol: TLSA, RFC 6698"
5 P. Mell, "The NIST Definition of Cloud Computing" NIST Special Publication 800-145, 2011
6 D. K. Smetters, "Talking to strangers : authentication in Ad-Hoc wireless networks" 2002
7 V. Bindschaedler, "Synthesizing plausible privacy-preserving location traces" 2016
8 D. Kim, "Security for IoT service" 30 (30): 53-59, 2013
9 Q. Zheng, "Secure and efficient proof of storage with deduplication" 1-12, 2012
10 G. Irazoqui, "S $A: A shared cache attack that works across cores and defies VM sandboxing--and its application to AES" 591-604, 2015
11 JR. Douceur, "Reclaiming space from duplicate files in a serverless distributed file system" 617-624, 2002
12 B. Niu, "Protection of location privacy in continuous LBSs against adversaries with background information" 1-6, 2016
13 B. Gedik, "Protecting location privacy with personalized k-anonymity : Architecture and algorithms" 7 (7): 1-18, 2008
14 S. Halevi, "Proofs of ownership in remote storage systems" 491-500, 2011
15 DX. Song, "Practical techniques for searches on encrypted data" 44-55, 2000
16 B. Parno, "Pinocchio : Nearly practical verifiable computation" 2013
17 N. Karapanos, "On the effective prevention of TLS man-in-the-middle attacks in web applications" 2014-, 2014
18 S. J. Moon, "Nomad : Mitigating arbitrary cloud side channels via provider-assisted migration" 1595-1606, 2015
19 F. Armknecht, "Mirror: Enabling proofs of data replication and retrievability in the cloud" 2016
20 박상봉, "IoT의 센싱 기술을 위한 직렬통신 설계 및 구현" 국제문화기술진흥원 3 (3): 27-30, 2017
21 M. Etemad, "Generic efficient dynamic proofs of retrievability" ACM 2016
22 D. Boneh, "Functional encryption : Definitions and challenges" 6597 : 253-273, 2011
23 F. Bonomi, "Fog computing and its role in the internet of things" 13-16, 2012
24 Y. Yarom, "Flush+ reload : a high resolution, low noise, L3 cache sidechannel attack" 719-732, 2014
25 R. Lu, "Eppa : An efficient and privacy-preserving aggregation scheme for secure smart grid communications" 23 (23): 1621-1631, 2012
26 S. M. Bellovin, "Encrypted key exchange: Password-based protocols secure against dictionary attacks" 1992
27 S. Keelveedhi, "DupLESS : server-aided encryption for deduplicated storage" 13 : 2013
28 H. Wang, "Comparing symmetric-key and public-key based security schemes in sensor networks : A case study of user access control" 1-6, 2008
29 P. Puzio, "ClouDedup : secure deduplication with encrypted data for cloud storage" 1 : 2013
30 Postscapes, "Best Internet of Things Definition"
31 K. M. Ramokapane, "Assured deletion in the cloud : requirements, challenges and future directions" 97-108, 2016
32 M. Gruteser, "Anonymous usage of location-based services through spatial and temporal cloaking" 31-42, 2003
33 Y. Kim, "Analysis and comprehension of cloud computing" 32 (32): 87-92, 2015
34 C. Modi, "A survey of intrusion detection techniques in cloud" 36 (36): 42-57, 2013
35 B. Jiang, "A survey of group key management" 3 : 994-1002, 2008
36 Z. Zhou, "A software approach to defeating side channels in last-level caches"
37 C. Gentry, "A fully homomorphic encryption scheme" Stanford Univ 2009
Communication Network Architectures for Southwest Offshore Wind Farm
최신 네트워크 응용 분류를 위한 자동화 페이로드 시그니쳐 업데이트 시스템
작전임무그룹 지원을 위한 Zone 기반 무선 Link-K 네트워크 구조 및 라우팅
하이브리드 위성-지상 중계기 네트워크에서 TCP 성능 분석
학술지 이력
연월일 | 이력구분 | 이력상세 | 등재구분 |
---|---|---|---|
2026 | 평가예정 | 재인증평가 신청대상 (재인증) | |
2020-01-01 | 평가 | 등재학술지 유지 (재인증) | |
2017-01-01 | 평가 | 등재학술지 유지 (계속평가) | |
2014-11-07 | 학술지명변경 | 외국어명 : The Journal of the KICS -> The Journal of Korean Institute of Communications and Information Sciences | |
2013-01-01 | 평가 | 등재 1차 FAIL (등재유지) | |
2010-01-01 | 평가 | 등재학술지 유지 (등재유지) | |
2008-01-01 | 평가 | 등재학술지 유지 (등재유지) | |
2006-01-01 | 평가 | 등재학술지 유지 (등재유지) | |
2003-01-01 | 평가 | 등재학술지 선정 (등재후보2차) | |
2002-01-01 | 평가 | 등재후보 1차 PASS (등재후보1차) | |
2001-01-01 | 평가 | 등재후보학술지 선정 (신규평가) |
학술지 인용정보
기준연도 | WOS-KCI 통합IF(2년) | KCIF(2년) | KCIF(3년) |
---|---|---|---|
2016 | 0.5 | 0.5 | 0.47 |
KCIF(4년) | KCIF(5년) | 중심성지수(3년) | 즉시성지수 |
0.4 | 0.34 | 0.466 | 0.14 |