Acknowledgement
Supported by : 한국연구재단
References
- Y. Yang and M. Kim, "A Study on Behavioral Intention on u-Health using Health Promotion Model," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 3, pp. 747-755, Mar. 2015. https://doi.org/10.6109/jkiice.2015.19.3.747
- Y. Kim, H. Lee, H. Park, S. Lee, T. Kang and J. Moon, "Trends and Prospect of u-Healthcare Device Industry," Proc. of the Korean Society of Precision Engineering Conference, pp. 172-173, Jul. 2015.
- B. Lee, Y. Jeong, S. Lee, "Design of Personal Information Security Model in U-Healthcare Service Environment," Journal of the Korea Society of Computer and Information, Vol. 16, No. 11, pp. 189-200, 2011. https://doi.org/10.9708/jksci.2011.16.11.189
- H. Kim, E. Ryu, S. Lee, "Security Considerations on Cognitive Radio based on Body Area networks for u-Healthcare," Journal of Security Engineering, Vol. 10, No. 1, pp. 9-20, Feb. 2013.
- M. Sarvabhatla and C. S. Vorugunti, "An energy efficient mutual authentication scheme for secure data exchange in health-care applications using wireless body sensor network," 2015 7th International Conference on Communication Systems and Networks (COMSNETS), pp. 1-6, 2015.
- D. He, N. Kumar and N. Chilamkurti, "A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks," Information Sciences, Vol. 321, pp. 263-277, 2015. https://doi.org/10.1016/j.ins.2015.02.010
- E. Yoon and K. Yoo, "A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks," Proc. of the 29th Annual ACM Symposium on Applied Computing, pp. 699-705, Mar. 2015.
- D. He, Y. Zhang and J. Chen, "Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks," IACR Cryptology ePrint Archive 2012, Vol. 203, 2012.
- D. Brown, SEC 2: Recommended Elliptic Curve Domain Parameters, 2nd Ed., pp.3-11, Certicom, 2010.