[۲۲] Baoquan Zhang, Zongfeng Zou,Mingzheng Liu,”Evaluation on Security System of Internet of ThingsBased on Fuzzy-AHP Method”IEEE,2011
[۲۳] LIU Qiang,CUI Li,CHEN Hai-ming.Key Technologies andApplications of Internet of Things.Compute Science,VOL.37,NO.6,June2010.
[۲۴] Kharif, “Like it or Not, RFID is coming” Business week online, March 18, 2004.
[۲۶] Collin Mulliner(2008), Attacking NFC Mobile Phones, FraunhoferSIT, EUSecWest, London, UK.
[۲۷] F. Jammes, and H. Smit, “Service-oriented paradigms inindustrial automation", IEEE Transactions on IndustrialInformatics, Feb. 2005, pp. 62-70.
[۲۸] Kaiser, E. “Wal-Mart starts RFID Test.” Forbes.com, April 30, 2004
[۲۹] EPoSS. Internet of Things in 2020[R]. 2008.
[۳۱]Pascual J,Sanjua´n O,CuevaJM,PelayoBC,A´lvarez M,Gonza´ lez A.Modeling architecture for collaborative virtualobjectsbasedonservices.Journalof Network and Computer Applications 2011;34(5):1634–۴۷.
[۳۲] Cui J-H, Kong J, Gerla M, Zhou S. The challenges of building mobile underwater wireless networks for aquatic applications. IEEE Network 2006;20(3):12–۸.
[۳۳]Liu L, Zhou S, Cui J-H. Prospects and problems of wireless communications for underwater sensor networks. Wiley Wireless Communications and Mobile Computing 2008;8(8):977–۹۴.
[۳۴] Domingo M, An overview of the internet of underwater things, Journal of Network and Computer Applications 35 (2012) 1879–۱۸۹۰
[۳۵] SHEN Changxiang, ZHANG Huanguo, and FENG Dengguo,“Literature Review of Information Security,” Science in China(SeriesE:Information Sciences), vol.37, no.2, 2007, pp.129–۱۵۰.
[۳۶] WU Chuankun, “A Preliminary Investigation on the SecurityArchitecture of the Internet of Things,” Bulletin of Chinese Academyof Sciences, vol.25, no.4, 2010, pp.411–۴۱۹.
[۳۷] Anne James and Joshua Cooper, “Database Architecture for theInternet of Things,” IETE Technical Review, vol.26, 2009, pp.311-312.
[۳۸] Juels, A. “RFID Security and Privacy: a research survey,” IEEEJournal on Selected Areas in Communications, vol.24, Issue 2,Feb.2006, pp.381-394.
[۳۹] MA Yujian, “The Design and the Implementation of an EPC-basedInformation System,” North China University of Technology, 2009.
[۴۰] Wonnemann, C. and Struker, J. “Password Management for EPCClass 1 Generation 2 ransponders,” IEEE Conference on EnterpriseComputing?E-Commerce and E-Services, July 2008, pp. 29-35.
[۴۱] Christoph P. Mayer, “Security and Privacy Challenges in the Internet of Things,” Electronic Communications of the EASST, vol.17, 2009.
[۴۲] G. Yang, J. Xu, W. Chen, Z. H. Qi, and H. Y. Wang, “Securitycharacteristic and technology in the internet of things,” Journal of NanjingUniversity of Posts and Telecommunications (Natural Science), vol. 30,no. 4, Aug 2010.
[۴۳]Srivaths Ravi,Anand Reghunathan,Paul Kocher,Sunil Hattangady, “Security in embedded Systems Desgin Challengs”,Augest 2004,Transactions on Embedded Computing Systems (TECS),Volume 3,Issue 3
[۴۴] Yang Jin-cui, Fang Bin-xing,” Security model and key technologies for the Internet of things”, The Journal of ChinaUniversities of Posts andTelecommunications,2011, 109-112
[۴۵]Lan li,”Study on Security Architecture in the Internet of Things”,International Conference on Measurement,Information and Control(MIC),2012
[۴۶] Atzori L., Iera A., Morabito Gi. ,” The Internet of Things: A survey”, Computer Networks 54 2787–۲۸۰۵,۲۰۱۰
[۴۷] Mohammad reza Akhondi, Simon Carlsen, Stig Petersen, Applications of Wireless SensorNetworks in the Oil,Gas and Resources Industries, 24th IEEE International Conference onAdvanced Information Networking and Applications, 2010
[۴۸] Chao Xiaojuan, Waltenegus Dargie and Lin Guan, Energy Model for MonitoringWireless Sensor Network, 11th IEEE International Conference on Computational Science andEngineering, 2008.
[۴۹] LXE Inc., “RFID Technology for Warehouseand Distribution Operations", WP, LXE Inc.,2006,pp. 2-6
[۵۰] Nano robots for Material Science, biology and Micro mounting by Stephen Kleindiek
[۵۱] Tiantian, Zhang; Andrew, Davidson; Steven L., Bryant; Chun, Huh; Nanoparticle-StablizedEmulsion for Applications inEnhanced Oil Recovery; the SPE Improved Oil Recovery Symposium;USA(Oklahoma); 2010
[۵۲] Bennion, D.B., et aI, “Underbalanced Drilling of Horizontal Wells, Does it Really Eliminate Formation Damage"J,CPT, November, 1995.
[۵۳] Hannegan, Do, “using nanoparticles to transport of drilling fluids for HPHT drilling: The When and Why", JCPT, May,1993.L. Di Silvio, Ph.D thesis, University of London, London, 1995.
[۵۴] Klaus Finkenzeller. Known attacks on RFID systems, possiblecountermeasures and upcoming standardisation activities. In 5th EuropeanWorkshop on RFID Systems and Technologies, (2009).
[۵۵] A. J. Jara; M. A. Zamora and A. F. G. Skarmeta. NFC/RFID applicationsin medicine: security challenges and solutions. 5th InternationalConference on Intelligent Environments - IE’09 (2009).
[۵۶] A. J. Jara; M. A. Zamora and A. F. G. Skarmeta. Secure use of NFC inmedical environments. 5th European Workshop on RFID Systems andTechnologies, (2009).
[۵۷] Gerald Madlmayr. NFC devices: Security & privacy. 3a InternacionalConference on Availability, Reliability and Security (2008).
[۵۸] A. J. Jara; M. A. Zamora and A. F. G. Skarmeta.An architecture based on Internet of Things to support mobility and security in medical environments,IEEE CCNC(2010)
[۵۹] W.K. Edwards, “Discovery systems in ubiquitouscomputing", IEEE Pervasive Computing, 2006, pp. 7077.
[۶۰] S. Karnouskos, O. Baecker, L.M.S. de Souza, and P.Spiess. “Integration of soa-ready networked embeddeddevices in enterprise systems via a cross-layered web serviceinfrastructure", In Proc. of the 12th International Conferenceon Emerging Technologies & Factory Automation (ETFA),25-28 Sept. 2007, pp. 293-300.
[۶۱] Huang Xuyong, “Basic Research of Wireless SensorNetworks and Applications in Power System",HuazhongUniversity of Science & Technology, Wuhan, 2008.
[۶۲]Lin Li,Application of the Internet of Thing In Green Agricultural Products Supply Chain Management,4th International Conferenceon on Intelligent Computation Technology and Automation,(IEEE),2011
[۶۳] Benjamin Fabian and Oliver Günther, “Security Challenges of theEPC Global Network,” Communications of the ACM, vol.52, July2009, pp.121-125.
[۶۴] Anderson, J. P. “Computer Security Technology Planning Study,”ESD/AFSC, Hanscom AFB, Bedford MA, vol.1, Oct.1972.
[۶۵] XU Na and WEI Wei, “Design and Implementation of TrustedPlatform Based on Secure Chip,” Application Research of Computers,no. 8, 2005, pp.117-119.
[۶۶] LI Hongpei, “What is Trusted Network Architecture,” Network &Computer Security, no.2, 2005, pp.36–۳۸.
[۶۷] ZHOU Yanwe, WU Zhenqiang, and YE Jiangca, “Study of NewTrusted Network Framework,” Computer Application, vol.29, no.9,Sep. 2009, pp.2535-2565.
[۶۸] PENG peng, HAN Weili, and ZHAO Yiming, “Research on SecurityRequirements of Internet of Things Based on RFID,” NationalSymposium on Computer Security, vol.25, 2010, pp.58-64.
[۶۹]Christof Paar, Andre Weimerskirch, “Embedded security in a pervasiveworld” , Information Security Technical Report, 2007 – Elsevier ,Volxme 12, Issue 3, 2007, Pages 155-161.
[۷۰] Matthew Eby, xan Werner, Gabor Karsai, Akos Ledeczi, “Embedded systems security co-design” , April 2007, SIGBED Review , Volume 4,Issue 2 ,Publisher: ACM
[۷۱] Gebotys, C.H.; Tiu, C.C.; Chen, X., “A countermeasure for EM attackof a wireless PDA,” Information Texhnology: Codinx and Computing,2005. ITCC 2005. International Conference on , vol.1, no., pp. 544-549Vol. 1, 4-6 April 2005
[۷۲]Tiri, K. and Verbauwhede, “Design Method for Constant power Consumption of Differential Logic Circuits”, In Proceedings of the Conference on Design, Automation and Test in Europe - Volume 1(March 07 - 11, 2005). Design, Automation, and Test in Exrope. IEEEComputer Society, Washington, DC, 628-633.
[۷۳] C. Huang. “An Overview of RFID Technology, Application, andSecurity/Privacy Threats and Solutions”. George Mason University,Scholarly paper, 2009.
[۷۴] C. Alcaraz, P. Najera, J. Lopez and R. Roman. “Wireless SensorNetworks and the Internet of Things: Do We Need a CompleteIntegration?”. International Workshop on the Security of The Internet ofThings (SecIoT), 2010.
[۷۵] R. Jehadeesan and J. Rajan. “Mobile communication Technologies”.library.igcar.gov.in/readit-2005/conpro/info mgt/s2-7.pdf (as on 19 Sep2011)
[۷۶] D. Rotondi, S. Gusmeroli, S. Piccione. “A capability-based security approach to manage access control in the Internet of Things”, Mathematical and Computer Modelling Journal, available online, March 2013.
[۷۷] Piotr Gaj, Jürgen Jasperneite, Max Felser.“Computer Communication within Industrial Distributed Environment – a Survey”, Mathematical and Computer Modelling Journal, volume 9, issue 1, pages 182-189, March 2013.
منابع کارشناسی ارشد با موضوع طراحی وضعیتی امن برای بکار ...