1 |
R. Lu, Z. Cao and Y. Zhou(2004), "A simple efficient proxy-protected signature scheme based on factoring", Comp. Stand. Inter., withdrawn.
|
2 |
E. J. KO(2009), "Leading health care revolution smart sensors", LG Business Insight, pp. 37-44.
|
3 |
Y. S. Jeong, S. H. Lee(2012), "U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information", THE JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY (J-KICS), Vol. 37,
|
4 |
Y. S. Jeong(2012), "RFID-based Authentication Protocol for Implantable Medical Device", The Journal Of Digital Policy & Management, Vol. 10, No. 2, pp. 141-146.
|
5 |
Y. Zhou, Z. Cao, and R. Lu(2005), "Provably secure proxy-protected signature schemes based on factoring", Appl. Math. Comput. Vol. 164, No. 1, pp. 83-98.
DOI
ScienceOn
|
6 |
Y. S. Jeong and S. H. Lee(2012), "u-Healthcare Service Authentication Protocol based on RFID Technology", The Journal Of Digital Policy & Management, Vol. 10, No. 2, pp. 153-160.
|
7 |
K. K. Venkatasubramanian, A. Banerjee and S. K. S. Gupta(2010), "PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks", Vol. 14, No. 1, pp. 60-68.
DOI
ScienceOn
|
8 |
M. Mambo, K. Usuda, and E. Okamoto(1996), "Proxy signatures for delegating signing operation", Proc. Third ACM Conf. on Computer and Communications Security. pp. 48-57.
|