2001
DOI: 10.1109/35.956115
|View full text |Cite
|
Sign up to set email alerts
|

Secure remote access from office to home

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…In the GHS approach [15], the messages are completely transparent at the trusted third party. In the second third party-based approach reviewed [16], the message containing the security information are visible to the trusted third party. Subsequently, this information can be used to make all communications between the remote client and home automation system transparent.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In the GHS approach [15], the messages are completely transparent at the trusted third party. In the second third party-based approach reviewed [16], the message containing the security information are visible to the trusted third party. Subsequently, this information can be used to make all communications between the remote client and home automation system transparent.…”
Section: Discussionmentioning
confidence: 99%
“…The GHS re-encrypt the information and forward the message to the appropriate home's IP address. In parallel and later Kara [16,17] proposed an almost identical scheme. In this scheme, the mobile client's first message to the trusted third party contains security information required by the home automation system to establish end-to-end security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation