References
- Y. S. Jeong, "Medical Information Management Scheme of Healthcare Service Patient through 2-way Access Control", Journal of Digital Convergence, Vol. 14, No. 7, pp. 185-191, Jul. 2016. https://doi.org/10.14400/JDC.2016.14.7.185
- Y. S. Jeong, "A Study of An Efficient Clustering Processing Scheme of Patient Disease Information for Cloud Computing Environment", Journal of IT Convergence Society for SMB, Vol. 6, No. 1, pp. 33-38, Mar. 2016. https://doi.org/10.22156/CS4SMB.2016.6.1.033
- Y. S. Jeong and S. H. Lee, "A User Privacy Protection Scheme based on Password through User Information Vir tuality in Cloud Computing", Journal of IT Convergence Society for SMB, Vol. 1, No. 1, pp. 29-37, Nov. 2011.
- Y. S. Jeong, "An Efficient m-Healthcare Service Model using RFID Technique", Journal of Digital Convergence, Vol. 13, No. 11, pp. 149-156, 2015. https://doi.org/10.14400/JDC.2015.13.11.149
- J. E. Lee and S. G. NAh, "An Emprircal Study of Usr Perrceptions on EMR Standardization Leading Medical & IT Convergence", Journal of Digital Convergence, Vol. 13, No. 5, pp. 111-118, 2015. https://doi.org/10.14400/JDC.2015.13.5.111
- A. T. Barth, M. a. Hanson, H. C. Powell, and J. Lach, "TEMPO 3.1: A body area sensor network platform for continuous movement assessment", Proc. - 2009 6th Int. Work. Wearable Implant. Body Sens. Networks, BSN 2009, pp. 71-76, June. 2009.
- Y. S. Jeong, "An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP", Journal of Digital Convergence, Vol. 13, No. 4, pp. 227-233, 2015. https://doi.org/10.14400/JDC.2015.13.4.227
- Z. Shelby, K. Hartke, C. Bormann, The Constrained Application Protocol (CoAP), IETF RFC 7252, June 2014.
- C. Wanpeng, B. Wei, "Adaptive and dynamic mobile phone data encryption method", Chian Communications, Vol. 11, Issue. 1, pp. 103-109, Jan. 2014.. https://doi.org/10.1109/CC.2014.6821312
- R. Madhusudhan, M. Hegde, "Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card", 2016 International conference on Computer and Communication Engineering(ICCCE), pp. 84-89, 2016.
- C. Chen, Y. Wang, H. Yu, x. H. Qiang, "The RFID mutual authentication scheme based on ECC and OTP authentication", 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1-4, 2016.
- G. Yu, Y. Shen, G. Zhang, Y. Yang, "A Chaos-based Color Image Encryption Algorithm", 2013 Sixth International Symposium on Computational Intelligence and Design, pp. 92-95, 2013.
- S. Som, A. Kotal, A. Chatterjee, S. Dey, S. Palit, "A colour image encryption based on DNA coding and chaotic sequences", 2013 1st International Conference on Emerging Trends and Applications in Computer Science, pp. 108-114, 2013.
- Man, Shushuang, D. Hong and M. M. Matthews, "A Shoulder-Surfing Resistant Graphical Password Scheme-WiW", Security and Management, 2003.
- Wiedenbeck, Susan, et. al, "PassPoints: Desing and logigudinal evaluation of a graphical password system", International Journal of Human-Computer Studies Vol. 63, No. 1, pp. 102-127, 2005. https://doi.org/10.1016/j.ijhcs.2005.04.010
- J. Thorpe, P. C. van Oorschot, "Grphical Dictionaries and the Memorable Space of Graphical Passwords", USENIX Security Symposium, 2004.
- Wiedenbeck, Susan, et al. "Design and evaluation of a shoulder-surfing resistant graphical password scheme", Proceedings of the working conference on Advanced visual interfaces, ACM, 2006.
- D. Rachna, "Hash visualization in user authentication", CHI'00 Extended Abstracts on Human Factors in Computing Systems, ACM, 2000.
- S. Leonardo and J. C. Birget, "Graphical passwords", The Rutgers Scholar, an electronic Bulletin for undergraduate research 4, 2002.
- S. Balaji, "Authentication techniques for engendering session passwords with colors and text", Advances in Computer Science and its Applications 1.3, pp. 189-195, 2012.
- M. Sreelatha et. al, "Authentication schemes for session passwords using color and images", International Journal of Netow가 Security & Its Applications 3.3, pp. 111-119, 2011. https://doi.org/10.5121/ijnsa.2011.3308