BromleyK.PerryM.WebbG.“Trends in Smart Home Systems, Connectivity and Services”2003, www.nextwave.org.uk
2.
SriskanthanN.TanF.KarandeA., “Bluetooth based home automation system”, Microprocessors and Microsystems2002, Vol. 26, No 6, pp. 281–289
3.
Al-AliA. R.Al-RousanM., “Java-based home automation system”, IEEE Transactions on Consumer Electronics2004, Vol. 50, No. 2, pp. 498–504
4.
AlkarA. Z.BuhurU., “An Internet based wireless home automation system for multifunctional devices”, IEEE Transactions on Consumer Electronics2005, Vol. 51, no 4, pp. 1169–1174
5.
YangS.JiY.YeZ., “Home automation network supporting plug-and-play”, IEEE Transactions on Consumer Electronics2004, Vol. 50, No 1, pp. 173–179
StallingsW.“Cryptography and Network Security Principles and Practices”, Third Edition, Prentice Hall, 2002.
10.
CorcoranP. M.DesbonnetJ.LustedK., “CEBus Network Access via the World-Wide-Web”, International Conference on Consumer Electronics 1996, pp.236
11.
DuncanR.ShabotM., “Secure remote access to a clinical data repository using a wireless personal digital assistant (PDA)”, Journal of the American Medical Informatics Association2000, pp. 210–214
12.
CharbonneauA.TerskikhV., “SpectroGrid: Providing Simple Secure Remote Access to Scientific Instruments”, 22nd International Symposium on High Performance Computing Systems and Applications 2008, pp 76–82
13.
HuYadaYinHaoLinChuangjiangXinOuyangYingLiChao, “CSGW-RAS: A novel secure solution for remote access based on SSL”, International Symposium on Intelligent Signal Processing and Communication Systems 2007, pp. 798–801
14.
KaraA., “Secure remote access from office to home”, IEEE Communications Magazine2001, Vol. 39, No 10, pp 68–72
15.
PortmannM.SeneviratneA., “The problem of end-to-end security for proxy-based systems”, In Proceedings of Protocols for Multimedia Systems, Cracow, Poland, 2000
16.
BergstromP.DriscollK.KimballJ., “Making home automation communications secure”, IEEE Computer2001, pp 50–56
17.
KaraA., “Private-to-private communications over the internet”, IEEE Computer2004, pp 53–59