1 |
Olla, P., Mobile health technology of the future: creation of an MHealth taxonomy based on proximity. International Journal of Healthcare Technology and Management (IJHTM), 2007.
|
2 |
Debargh Acharya, et al, "Security in Pervasive Health Care Networks: Current R&D and Future Challenges", 11th International Conference on Mobile Data Management", pp.305-306, 2011.
|
3 |
Azzedine Boukerche, et al, "A Secure Mobile Health System Using Trust-Based Multicast Scheme", IEEE J. On selected areas in communications, vol.27, no.4, pp.387-399, May 2009.
DOI
ScienceOn
|
4 |
Cheng-Ju Li et al., "Mobile healthcare service system using WID". IEEE, International Conference on Networking, Sensing and Control, pp. 1014-1019, Mar. 2004.
|
5 |
I. Vajda and L. Buttyan, "Lightweight authentication protocols for low cost RFID tags," in Proc, 2nd Workshop on Security in Ubiquitous Computer, pp.76-82, 2003.
|
6 |
Kim, J., and Sahama, T. "A Study on the Encryption Model for Numerical Data", International Journal of KIMICS, Vol.7, pp. 31-34, 2009.
|
7 |
Stallings, W., Cryptography and Network Security (4th Edition). Prentice Hall., 2006.
|