References
- C. S. Wang, Y. R. Tzeng, "A Wireless Networking Technologies Overview Over Ubiquitous Service Applications", Proc. of Networked Computing and Advanced Information Management, pp. 156-161, Sep. 2000.
- R. Sulaiman, D. Sharma, W. Ma, D. Tran, "A Security Architecture for e-Health Services", Proc. of International Conference on Advanced Communication Technology, pp. 999-1004, Feb. 2008.
- T. T. May, "Medical information security: the evolving challenge", 32nd Annual 1998 International Carnahan Conferenece on. of Security Technology, pp. 85-92, 2000.
- C. S. Jang, W. J. Han, "Security Requirement Analysis for WBAN environment", Fall 2008, KIMICS Integrated Conference, pp. 260-263. 2008.
- H. S Chen, M. J. Su, T. H. Tsai, S. S. Teng, H. W. Zhang, "U-Care for the elderly Implementation of a Comprehensive Living and Health Care Network", e-Health networking, Application and Services, pp. 187-190, June. 2007.
- C. W. Jeong, D. H. Kim, M. H. Kim, S. J. Joo, "A Dynamic Security Service using Access Control Model in Distributed Framewirk Support for u-Healthcare", Journal of Korean Society for Internet Information, Vol.8, No.6, pp. 29-42, 2007.
- J. E. Song, S. H. Kim, M. E. Jeong, K. I. Jeong, "Security Issues and Its Technology Trends in u-Healthcare", Electronics and Telecommunications Trends Vol.22, No.1, pp. 119-129, Feb. 2007.
- F. W. Xuan, D. M. Chui, L. W. Kei, "Novel system sampling multi vital signs for e-Home Healthcare", Proc. of 7th Int'l Conference on Information, Communications and Signal Processing, pp. 1-5, 2009.
- Y. Yao, J. Chong, W. Xingwei, "Enhancing RC4 algorithm for WLAN WEP protocol", Control and Decision Conference (CCDC) Chinese, pp. 3623-3627, 2010.
- A. Bogdanov, D. Khovratovich, and C. Rechberger, "Biclique Cryptanalysis of the Full AES", Proc. of Int'l Conference on Theory and Application of Cryptology and Information Security ASIACRYPT 2011, pp. 344-371, Dec. 2011.
- M. H. Kim, J. S. Kim, A. R. Kim, K. J. Chae, "New Security Technology Trends of Wireless Sensor Network", Korea Information Processing Society Review, Vol. 17, No. 1, pp. 139-147, 2008.
- K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, "Protocol for self-organization of a wireless sensor network", Personal Communications IEEE, Vol. 7, pp. 16-27, Oct. 2000. https://doi.org/10.1109/98.878532
- K. Fall, "A delay-tolerant network architecture for challenged internets", ACM SIGCOMM 2003, pp.27-34, Aug. 2003.
- S. J. Lee, and W. W. Su, "An adaptive and fault-tolerant gateway assignment in sensor networks", 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Vol. 6, No.5, PP.576-578, April 2004.
- M. Paksuniemi, H. Sorvoja, E. Alasaarela, and R. Myllyla, "Wireless sensor and data transmission needs and technologies for patient monitoring in the operating room and intensive care unit", Engineering in Medicine and Biology Society 2005 IEEE-EMBS 2005 27th Annual international Conference, pp. 5182-5185, Jan. 2006.
- Y. R. Lee, D. G. Park, E. "Role based access control of healthcare information system for Mobile environments", Journal of the Korea Society of Computer and Information, Vol. 10, No.5, pp. 119-132, July. 2005.
- J. W. Kim, H. "Implementation of a pervasive health care system for cardiac patient on mobile environment", Journal of the Korea Society of Computer and Information, Vol. 13, No.2, pp. 117-124, Sep. 2008.
Cited by
- Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs vol.18, pp.11, 2012, https://doi.org/10.9708/jksci.2013.18.11.115