Designed OTP Generation Method Using Health Information
![]() |
Choo, Yeun-Su
(Dept. of Computer Graduate School Soongsil University)
Kang, Jung-Ho (Dept. of Computer Graduate School Soongsil University) Kim, Kyoung-Hun (Dept. of Computer Information, Gangdong University) Park, Jea-Pyo (Graduate School of Information Sciences Soongsil University) Jun, Moon-Seog (Dept. of Computer Graduate School Soongsil University) |
1 | Han-na You, Jae-Sik Lee, Jung-Jae Kim, Jae-Pio, Moon-Seog Jun, A Study on the Two-Channel Authentication Method which Provides Two-way Authentication using Mobile Certificate int Internet Banking Environment, The Journal of Korea Information and Communications Society, Vol. 36, No. 8, pp. 939-946, 2011. DOI ScienceOn |
2 | Shirly Lee, Ivy Ong, HyoTaek Lim, HoonJae Lee, International Journal of KIMICS, Vol. 8, No. 4, pp 427-432, 2010. |
3 | DOI: http://www.ietf.org/rfc/rfc2289.txt |
4 | DOI: http://www.ietf.org/rfc/rfc4226.txt |
5 | DOI: http://www.ietf.org/rfc/rfc6238.txt |
6 | TTA, u-Health Service Reference Model , TTA, 2010 |
7 | TTA, Information Security Reference Model for u-Health Service, TTA, 2011.6 |
8 | So-Yeon Min, Byung-Wook Jin, "Disign of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment", Journal of the Korea Academia-Industrial cooperation Society, Vol 15, No 6, pp.3865-3871, 2014 DOI ScienceOn |
9 | M. Tubaishat, S. Madria, Sensor Networks: An Overview, IEEE Potentials, Vol. 22, Issue. 2, 20-23, 2003. DOI |
10 | Dong-Min Shin, Dong-Il Shin, Dong-Kyoo Shin, Development of u-Health Care System for Dementia Patients, The Journal of Korea Information and Communications Society, Vol. 38C, No. 12, pp.1106-1113, 2013. DOI ScienceOn |
11 | Hyeon-Suk Jang, Tae-Hak Ban, Se-Cheol Jang, Hoe-Kyung Jung, Journal of the Korea Institute of Information and Communication Engineering, Vol. 17, No. 11, pp. 2693-2698, 2013. DOI ScienceOn |
12 | Yun-Young Sok, Seok-Hun Kim, Integrated Medical Information System Implementation for the u-Healthcare Service Environment, Journal of the Korea Contents Association, Vol. 14, No. 5, pp.1-7, 2014. DOI |
13 | TTA, Algorithm Profile for a one-time password, TTA, 2012.12 |
14 | TTA, Road map for the one time password standards,TTA, 2011.12 |
15 | R. Rivest "The MD5 message digest alrogithm." Requests for Comments(RFC) 1321, 1992. |
16 | Behrouz A. Forouzan, Cryptography and Network Security(International Edition), pp.377-398, McGraw-Hill, 2008. |
![]() |