[1] |
封顺天. 可穿戴设备发展现状及趋势[J]. 信息通信技术, 2014, (3): 52-57.
|
[2] |
Pyattaev A, Johnsson K, Andreev S, et al.Communication Challenges in High-density Deployments of Wearable Wire-less Devices[J]. IEEE Wireless Communications, 2015, 22(1): 12-18.
|
[3] |
文伟平,郭荣华,孟正,等. 信息安全风险评估关键技术研究与实现[J]. 信息网络安全,2015,(2):7-14.
|
[4] |
刘金芳, 可穿戴设备发展趋势及信息安全风险分析[J]. 信息安全与技术, 2014, (11): 10-12.
|
[5] |
夏戈明,史立哲,周文,等. 轻量级RFID双向通信认证协议优化方案[J]. 信息网络安全,2014,(2):58-62.
|
[6] |
Lin Y, Lin Y, Chih C, et al.EasyConnect: A Management System for IoT Devices and Its Applications for Interactive Design and Art[J]. IEEE Internet of Things Journal, 2015,(8):23-31.
|
[7] |
He D, Chan S, Guizani M.User Privacy and Data Trustworthiness in Mobile Crowd Sensing[J]. IEEE Wireless Com-munications, 2015, 22(1): 28-34.
|
[8] |
卿斯汉. 关键基础设施安全防护[J]. 信息网络安全,2015,(2):1-6.
|
[9] |
Kirkham R, Greenhalgh C.Social Access vs. Privacy in Wearable Computing: A Case Study of Autism[J]. IEEE Perva-sive Computing, 2015, 14(1): 26-33.
|
[10] |
Kim S.D, Lee S. M, Lee S. E. Secure Communication System for Wearable Devices Wireless Intra Body Communi-cation[C]//2015 IEEE International Conference on Consumer Electronics (ICCE). China: 2015, 381-382.
|
[11] |
Juels A.“Yoking-proofs” for RFID Tags[C]//The Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. Florida: 2004, 138-143.
|
[12] |
Diez F.P, Touceda D. S, Camara J M S, et al. Toward Self-authenticable Wearable Devices[J]. IEEE Wireless Communications. 2015, 22(1): 36-43.
|
[13] |
落红卫,魏亮徐,迎阳. 可穿戴设备安全威胁与防护措施[J]. 电信网技术,2013,11(11): 9-11.
|