1 |
H.-J. Mun, H.-Y. Jeong, K.-H. Han, "Improved Trialateration Method on USN for reducing the Error of a Moving Node Position Measurement", Journal of Digital Convergence, (2016), Vol. 14, No. 5, pp. 301-307.
|
2 |
K.-H. Lee, "A Study of Security Policy for U-Healthcare Service", The Journal of Digital Convergence, (2013), Vol. 11, No. 11, pp. 747-751.
DOI
|
3 |
K.-K. Lim. Y.-H. Lim, "A Study on User Satisfaction in u-IT New Technology Verification Projects Focused on Domestic RFID/USN Pilot Projects", Journal of Digital Convergence, (2010), Vol. 8, No. 1, pp. 1-10.
|
4 |
B.-S. Kim, "U-Healthcare & Medical Information System of Status and Operative Challenges for Integrated Medical Information System", Journal of Digital Convergence, (2011), Vol. 9, No. 5, pp. 65-75.
|
5 |
S.-J. Choi, B.-G. Kang, "The Windows Push Server System with Smart Device Identifying Fingerprints over IEEE 802.15.4 Protocol", The Journal of Digital Convergence, (2012), Vol. 10, No. 11, pp. 419-425.
DOI
|
6 |
B.-H. Shin, H.-K. Jeon, K.-Y. Chung, "An Energy Efficient Clustering Method Based on ANTCLUST in Sensor Network", Digital Convergence, (2012), Vol. 10, No. 1, pp. 371-378.
|
7 |
H.-W. Choi, M.-C. Ryoo, C.-S. Lee, H. Kim, "Secure Data Gathering Protocol over Wireless Sensor Network", The Journal of Digital Convergence, (2013), Vol. 11, No. 12, pp. 367-380.
|
8 |
H. Kim, "Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS", Sensors, (2014), Vol. 14, doi:10.3390/s141223742.
DOI
|
9 |
L. Lamport, "Password authentication with insecure communication", Communications of the ACM, (1981), Vol. 24, pp. 770-772.
DOI
|
10 |
S.-W. Lee, H. Kim, K.-Y. Yoo, "Improved efficient remote user authentication scheme using smartcards", IEEE Trans. on Consumer Electronics, (2004), Vol. 50, No. 2, pp. 565-567
DOI
|
11 |
S.-W. Lee, H. Kim, K.-Y. Yoo, "Efficient verifier-based key agreement protocol for three parties without server's public key", Applied Mathematics and Computation, (2005), Vol. 167, No. 2, pp. 996-1003.
DOI
|
12 |
M. L. Das, "Two-factor user authentication scheme in wireless sensor networks", IEEE Trans. on Wirel. Commun., (2009), Vol. 8, pp. 1086-1090.
DOI
|
13 |
H. Kim, S.-W. Lee, "Enhanced Novel Access Control Protocol over Wireless Sensor Networks", IEEE Trans. on Consumer Electronics, (2009), Vol. 55, No. 2, pp. 492-498.
DOI
|
14 |
L. Chen, F. Wei, C. Ma, "A secure user authentication scheme against smart-card loss attack for wireless sensor networks using symmetric key techniques", Int. J. Distrib. Sens. Netw., (2015), doi:10.1155/2015/704502.
DOI
|
15 |
J. Jung, J. Kim. Y. Choi, D. Won, "An Anonymous User Authentication Scheme based on a Symmetric Cryptosystem in Wireless Sensor Networks", Sensors, (2016), Vol. 16, doi:10.3390/s16081299.
DOI
|
16 |
H. Kim, S. W. Lee, "Authenticated Key Agreement Scheme with Forward Secrecy for Wireless Sensor Networks", International Journal of Control and Automation, (2015), Vol. 8, No. 11, pp. 279-288.
|