References
- Y. J. Park and Y. B. Kim, "On the accuracy of RFID tag estimation functions," Journal of Information and Communication Convergence Engineering, vol. 10, no. 1, pp. 33-39, 2012. https://doi.org/10.6109/jicce.2012.10.1.033
- Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and privacy in RFID and applications in telemedicine," IEEE Communications Magazine, vol. 44, no. 4, pp. 64-72, 2006.
- L. Lhotska, P. Aubrecht, A. Valls, and K. Gibert, "Security recommendations for implementation in distributed healthcare systems," in Proceedings of the 42nd Annual IEEE International Carnahan Conference on Security Technology, Prague, Czech, pp. 76-83, 2008.
- R. K. Pateriya and S. Sharma, "The evolution of RFID security and privacy: a research survey," in Proceedings of the International Conference on Communication Systems and Network Technology, Katra, India, pp. 115-119, 2011.
- S. Moncrieff, S. Venkatesh, and G. West, "A framework for the design of privacy preserving pervasive healthcare," in Proceedings of the IEEE International Conference on Multimedia and Expo, New York: NY, pp. 1696-1699, 2009.
- J. Sun, Y. Fang, and X. Zhu, "Privacy and emergency response in ehealthcare leveraging wireless body sensor networks," IEEE Wireless Communications, vol. 17, no. 1, pp. 66-73, 2010.
- A. Boukerche and Y. Ren, "A secure mobile healthcare system using trust-based multicast scheme," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 387-399, 2009. https://doi.org/10.1109/JSAC.2009.090504
- M. Markovic, Z. Savic, and B. Kovacevic, "Secure mobile health systems: principles and solutions," in M-health: Emerging Mobile Health Systems, New York, NY: Springer, pp. 81-106, 2006.
- C. J. Su and B. J. Chen, "Ubiquitous community care using sensor network and mobile agent technology," in Proceedings of the 7th International Conference on Autonomic & Trusted Computing, Xian, China, pp. 99-104, 2010.
- Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 400-411, 2009. https://doi.org/10.1109/JSAC.2009.090505
- W. Tounsi, J. Garcia-Alfaro, N. Cuppens-Boulahia, and F. Cuppens, "Securing the communications of home health care systems based on RFID sensor networks," in Proceedings of the 8th Annual Communication Networks and Services Research Conference, Montreal, Canada, pp. 284-291, 2010.
- W. Yao, C. H. Chu, and Z. Li, "The use of RFID in healthcare: Benefits and barriers," in Proceedings of the IEEE International Conference on RFID-Technology and Applications, Guangzhou, China, pp. 128-134, 2010.
- S. W. Wang, W. H. Chen, C. S. Ong, L. Liu, and Y. W. Chuang, "RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital," in Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Kauai: HI, p. 184a, 2006.
- W. D. Yu, R. Gummadikayala, and S. Mudumbi, "A web-based wireless mobile system design of security and privacy framework for u-Healthcare," in Proceedings of the 10th International Conference on e-health Networking, Applications and Services, Singapore, pp. 96-101, 2008.
- D. Acharya, "Security in pervasive health care networks: current R&D and future challenges," in Proceedings of the 11th International Conference on Mobile Data Management, Kansas City: MO, pp. 305-306, 2010.
- H. Y. Chien, "Varying pseudonyms-based RFID authentication protocols with DOS attacks resistance," in Proceedings of the IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, pp. 607-614, 2008.
- C. C. Hung and S. Y. Huang, "On the study of a ubiquitous healthcare network with security and QoS," in Proceedings of the IET International Conference on Frontier Computing: Theory, Technologies and Application, Taichung, Taiwan, pp. 139-144, 2010.
- Z. Li, H. Shen, and B. Alsaify, "Integrating RFID with wireless sensor networks for inhabitant, environment and health monitoring," in Proceedings of the 14th IEEE International Conference on Parallel and Distributed Systems, Melbourne, Australia, pp. 639-646, 2008.
- W. Yao, C. H. Chu, and Z. Li, "The use of RFID in healthcare: benefits and barriers," in Proceedings of the IEEE International Conference on RFID: Technology and Applications, Guangzhou, China, pp. 128-134, 2010.
- S. Kahn and V. Sheshadri, "Medical record privacy and security in a digital environment," IT Professional, vol. 10, no. 2, pp. 46-52, 2008.
- R. C. W. Phan, "Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI," IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 4, pp. 316-320, 2009. https://doi.org/10.1109/TDSC.2008.33
- L. Xiao, P. Lewis, and A. Gibb, "Developing a security protocol for a distributed decision support system in a healthcare environment," in Proceedings of the 30th ACM/IEEE International Conference on Software Engineering, Leipzig, Germany, pp. 673- 682, 2008.
- J. Misic, "Enforcing patient privacy in healthcare WSNs using ECC implemented on 802.15.4 beacon enabled clusters," in Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, Hong Kong, China, pp. 686-691, 2008.
Cited by
- Applying Clinical Judgment Rubric for Evaluation of Simulation Practice for Nursing Students : A Non-Randomized Controlled Trial vol.14, pp.2, 2018, https://doi.org/10.5392/ijoc.2018.14.2.035
- 엄지손가락의 관절 굽힘의 이상 측정 및 치료 vol.22, pp.10, 2012, https://doi.org/10.6109/jkiice.2018.22.10.1355
- Comparison of Step Counting Methods according to the Internal Material Molding Methods for the Module of a Smart Shoe vol.13, pp.1, 2012, https://doi.org/10.7236/ijibc.2021.13.1.90
- Comparison of Step Counting Methods according to the Internal Material Molding Methods for the Module of a Smart Shoe vol.13, pp.1, 2012, https://doi.org/10.7236/ijibc.2021.13.1.90