1 |
Azzedine Boukerche, et al, "A Secure Mobile Health System Using Trust-Based Multicast Scheme", IEEE J. On selected areas in communications, v.27, n.4, may 2009, pp.387-399.
DOI
ScienceOn
|
2 |
J.H.Kim and Sahama, T. "A Study on the Encryption Model for Numerical Data,", International Journal of KIMICS , vol.7, pp.31-34. 2009.
|
3 |
Shinyoung Lim, "Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring", 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.327-332, 2010.
|
4 |
Bong-Keun Rhee, etcs, "Privacy Model based on RBAC for U-Healthcare Service Environment", KIICE(Journal of The Korea Institute of Information and Communication Engineering), Vo.16, N.3, March 2012, pp.605-614
DOI
ScienceOn
|
5 |
Young-Jae Park, "On the Accuracy of RFID Tag Estimation Functions", JICCE(Journal of Information and Communication Convergency Engineering), V.10, N. 1, March 2012, pp.33-39
DOI
|
6 |
Jung-Hyun Oh, etcs, "A Secure Communication Protocol for Low-cost RFID System", Seventh International Conference on Computer and Information Technology, pp.949-954, 2007.
|
7 |
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez- Tapiador, and A. Ribagorda, "EMAP: A Efficient Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. OTM Information Security Workshop (IS '06), pp. 352-361, 2006.
|
8 |
Ari Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal of selected areas in communications, V.24, N.2, pp.381-394, February, 2006
DOI
ScienceOn
|
9 |
H.Y. Chien. "SASI: A New Ultra-weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing., vol.4, n.4, pp.337-340, Oct. 2007
DOI
ScienceOn
|
10 |
Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.31, n.56, pp.357-370, 2004
|