References
- H. Kim. (2017). Data Centric Security and Privacy Research Issues for Intelligent Internet of Things. ICSES Interdisciplinary Transactions on Cloud Computing, IoT, and Big Data, 1(1), 1-2.
- Y. Kim. (2019). A Study on Smart Contract for Personal Information Protection. Journal of Digital Convergence, 17(3), 215-220. https://doi.org/10.14400/JDC.2019.17.3.215
- H. Kim. (2019). Research Issues on Data Centric Security and Privacy Model for Intelligent Internet of Things based Healthcare. ICSES Transactions on Computer Networks and Communications, 5(2), 1-3.
- B. Vaidya, J. H. Park, S. S. Yeo & J. Rodrigues. (2011). Robust one-time password authentication scheme using smart card for home network environment. Computer Communications, 34, 326-336. https://doi.org/10.1016/j.comcom.2010.03.013
- H. J. Kim & H. S. Kim. (2011). Auth hotp-hotp based authentication scheme over home network environment. Lecture Notes in Computer Science, 6784, 622-637.
- B. Vaidya, D. Makrakis & H. T. Mouftah. (2011). Device authentication mechanism for smart energy home area networks. Proc. of IEEE International Conference on Consumer Electronics, 787-788.
- I. H. Cho & K. H. Lee. (2019). A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment. Journal of Digital Convergence, 17(2), 171-176. https://doi.org/10.14400/JDC.2019.17.2.171
- F. K. Santoso & N. C. H. Vun. (2015). Securing IoT for smart home system, Proc. of IEEE International Symposium on Consumer Electronics, 1-2.
- H. W. Choi, S. Kim & M. Ryoo. (2019). Cryptanalysis and Solution on Secure Communication Scheme for Healthcare System using Wearable Devices, Journal of Digital Convergence, 17(2), 187-194. https://doi.org/10.14400/JDC.2019.17.2.187
- W. J. Lee, K. W. Kim & H. Kim. (2012). Ticket-Based Authentication Protocol Using Attribute Information over Home Network. IEMEK Journal of Embedded Systems Applications, 7(1), 53-59. https://doi.org/10.14372/IEMEK.2012.7.1.053
- M. Shuai, N. Yu, H. Wang & L. Xiong. (2019). Anonymous authentication scheme for smart home environment with provable security. Computers & Security, 86, 132-146. https://doi.org/10.1016/j.cose.2019.06.002
- H. Kim, E. K. Ryu & S. W. Lee, (2011), Security Considerations on Cognitive Radio based on Body Area Networks for u-Healthcare, Journal of Security Engineering, Vol. 10, No. 1, pp. 9-20.
- S. Y. Mun, Y. M. Yun, T. H. Han, S. E. Lee, H. J. Chang, S. Y. Song&H. C. Kim, (2017),Public Awareness of Digital Healthcare Services, Journal of Digital Convergence, Vol. 18, No. 4, pp. 621-629.
- J. E. Song, S. H. Kim, M. A. Chung & K. I, Chung, (2007), Security issues and its technology trends in u-Healthcare, Electronics and Telecommunications Trends, Vol. 22, No. 1, pp. 119-129.
- T. M. Song & S. H. Jang, (2011), u-Healthcare : Issue and Research Trends, Korea Institute for Health and Social Affairs, pp. 119-129.