Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cellular IP: a new approach to Internet host mobility
ACM SIGCOMM Computer Communication Review
Interaction of All IP Mobile Internet Devices with Networked Appliances in a Residential Home
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
Remote controlling devices using instant messaging: building an intelligent gateway in Erlang/OTP
Proceedings of the 2005 ACM SIGPLAN workshop on Erlang
Virtual Private Ad Hoc Networking
Wireless Personal Communications: An International Journal
A study of the MD5 attacks: insights and improvements
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
A communication architecture for spontaneous systems
IEEE Wireless Communications
A protocol for wide area secure networked appliance communication
IEEE Communications Magazine
Hi-index | 0.00 |
The motivation for this research arises from the explosion in the numbers of embedded devices in residential home environments, and their novel capabilities to connect with the Internet. As contributions, an experimental private machine-to-machine (M2M) service space environment for automation in residential home is provided. The novel solutions for the M2M architecture are provided to enable dynamic application of a secure communication overlay, smooth configuration and service discovery. The available M2M services connected with the secure overlay are smoothly visualized in a user interface of the private M2M service space. The achieved results indicate that the provided enablers for the M2M architecture, dynamic service configuration and discovery works quite well in dynamic distributed home environment. The secure network overlay offered high level security with the aid of cryptographic identifiers.