References
- Yuksel, M., Dogac, A."Interoperability of Medical Device Information and the Clinical Applications: An HL7 RMIM based on the ISO/IEEE 11073 DIM", , IEEE Transactions on Information Technology in Biomedicine, Volume 15, Issue 4, Pages: 557 - 566, 2011 https://doi.org/10.1109/TITB.2011.2151868
- https://developer.apple.com/healthkit/
- https://www.microsoft.com/microsoft-health
- http://www.microsoft.com/microsoft-band/
- https://www.healthvault.com/
- Personal Health Records and the HIPAA Privacy Rule.
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek CheeShow less, "HIGHT: A New Block Cipher Suitable for Low-Resource Device", Lecture Notes in Computer Science, Vol. 4249, pp 46-59, 2006.
- JeaHoon Park, JaeCheol Ha, "Improved Differential Fault Analysis on Block Cipher ARIA," Lecture Notes in Computer Science, Vol. 7690, pp 82-95, 2012.
- Hamid Mala , Mohammad Dakhilalian, Mohsen Shakiba, "Impossible Differential Attacks on 13-Round CLEFIA-128", Journal of Computer Science and Technology, Volume 26, Issue 4, pp 744-750, July 2011. https://doi.org/10.1007/s11390-011-1173-0
- Hong, Deukjo, Jung-Keun Lee, Dong-Chan Kim,Daesung Kwon, Kwon Ho Ryu, and Dong-Geon Lee. "LEA: A 128-bit block cipher for fast encryption on common processors." In Information Security Applications, pp. 3-27. Springer International Publishing, 2014.
- A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, C. Vikkelsoe, "PRESENT: An Ultra-Lightweight Block Cipher", Lecture Notes in Computer Science, Volume 4727, pp 450-466, 2007.
- Elena Trichina, Domenico De Seta, and Lucia Germani, "Simplified Adaptive Multiplicative Masking for AES", Lecture Notes in Computer Science(LNCE), Vol.2523, pp.71-85, 2003.
- Wheeler, David J. and Needham, Roger M. "TEA Extensions". Computer Laboratory, Cambridge University, England. October, 1997.
- ENGELS, Daniel, et al. The Hummingbird-2 lightweight authenticated encryption algorithm. In: RFID. Security and Privacy. Springer Berlin Heidelberg, 2012. p. 19-31.
- Eunjong Hong, Jai-Hoon Chung, Chae Hoon Lim, "Hardware Design and Performance Estimation of the 128-bit Block Cipher Crypton", Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, Pages 49-60, 1999.
- Myung-Kyu Yi, Hee-Joung Hwang, "A Low Power Lifelog Management Scheme Based on User Movement Behaviors in Wireless Networks" The Journal of The Institute of Internet, Broadcasting and Communication (IIBC), Vol. 15, No. 2, pp.157-165, Apr. 30, 2015. https://doi.org/10.7236/JIIBC.2015.15.2.157
- Yun-Jeong Lee, Hyung-Deok Shin, "Effects of Contents Narrativity on the Related Contents Preference: Surveying on Korean College Students", Journal of the Korea Academia- Industrial cooperation Society, Vol. 16, No. 1 pp. 62-69, 2015 https://doi.org/10.5762/KAIS.2015.16.1.62