1 |
H. Kim, E. K. Ryu & S. W. Lee. (2011). Security Considerations on Cognitive Radio based on Body Area Networks for u-Healthcare. Journal of Security Engineering, 10(1), 9-20.
|
2 |
S. Y. Mun, Y. M. Yun, T. H. Han, S. E. Lee, H. J. Chang, S. Y. Song & H. C. Kim. (2017). Public Awareness of Digital Healthcare Services. Journal of Digital Convergence, 15(4), 621-629.
|
3 |
J. E. Song, S. H. Kim, M. A. Chung & K. I, Chung. (2007). Security issues and its technology trends in u-Healthcare. Electronics and Telecommunications Trends, 22(1), 119-129.
|
4 |
T. M. Song & S. H. Jang. (2011). u-Healthcare : Issue and Research Trends. Korea Institute for Health and Social Affairs, 119-129.
|
5 |
C. B. Roh & J. B. Song. (2015). Hybrid Healch Care System Designs in a Wireless Network Environment, Journal of Digital Convergence, 13(3), 457-462.
DOI
|
6 |
J. E. Yoon & C. J. Suh. (2018). Research Trend Analysis on Smart Healthcare by using Topic Modeling and Ego Network Analysis. Journal of Digital Convergence, 16(5), 981-993.
|
7 |
L. Mark & F. John. (2011). Remote control of medical devices using instant messaging infrastructure. U.S. Patent CA2718696 A1, Dec. 8.
|
8 |
S. B. Othman & A. Trad. H. (2014). Youssef, Security artchitecture for at-home medical care using wireless sensor network, Proc. of International conference on wireless communications and mobile computing conference 2014, 304-309.
|
9 |
S. Syms & A. D. Kumar. (2016). Secured WBANs for pervasive m-healthcare social networks. Proc. of 10th International Conference on Intelligent Systems and Control.
|
10 |
S. Han, S. Q. Li, C. H. Ju & W. Zhou. (2016). PPM-HDA:Privacy-preserving and multifuntional health data aggregation with fault tolerance, IEEE Transactions on Information Forensics and Security, 11(9), 1940-1955.
DOI
|
11 |
J. Liu, Z. Zhang & K. S. Kwak. (2014). Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 332-342.
DOI
|
12 |
P. Vijayakumar, P. Pandiaraja, M. Kaaruppiah & L. J. Deborah. (2017). An efficient secure communication for healthcare system using wearable devices. Computers and Electrical Engineering, 63, 232-245.
DOI
|
13 |
Wikipedia, Denial of service attack, https://ko.wikipedia.org/wiki/Denialofserviceattack.
|
14 |
Wikipedia. Data integrity, https://ko.wikipedia.org/wiki/Dataintegrity.
|
15 |
F. Wu, L. Xu, S. Kumari, X. Li, A. K. Das, M. K. Khan, M. Karuppiah & R. Baliyan. (2016). A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Security and Communication Networks, 9, 3527-2542.
DOI
|