1 |
Y. B. Cho, and S. H Lee, “An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment” Journal of The Korean Institute of Communications and Information Sciences, vol. 37B, no.3, pp. 149-157, 2013.
|
2 |
J. E. Song, S. H. Kim, M. A. Jung and K. I. Jung, “Medical information securiey of u-Healthcare service” Journal of The Korean Institute of Communications and Information Sciences, vol. 17, no. 1, pp. 47~56, 2007.
|
3 |
K. J. Kim and S. P. Hong, “Privacy Information Protection Model in e-Healthcare Environment” Journal of The Korean Society for Internet Informatin, vol. 10, no. 2, 2008.
|
4 |
Wong, K. Chung, G. Mohamed, and S. L. Simon,Lam. "Secure group communications using key graphs." in Proceeding of the IEEE/ACM Transactions, vol. 8. no. 1, pp.16-30, 2000.
|
5 |
Y. B. Cho, S. H. Woo and S. H Lee, “ IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment” Journal of The Korean Institute of Communications and Information Sciences, vol 38B, no. 10, pp. 801-807, 2013.
DOI
|
6 |
Y. D. Joo and Y. H. An, “Improvements of a Dynamic ID-Based Remote User Authentication Scheme” Journal of The Institute of Webcasting, Internet and Telecommunication, vol. 11, no. 6, pp. 303-310, 2011.
|
7 |
Q. D Vu, B. N. Thai, and Een-Kee Hong. "A New Scheme for Multi-user Cooperation System Based on Iterative Decoder"in Proceeding of the KICIS Transactions. pp. 39-40. 2011.
|
8 |
J. H. Lee, J. S. Yu, H. J. Yoon and H.J Jang, “ System for Protecting Medical Informatio” Journal of The Korean Society for Internet Informatin, pp. 429-434, 2010.
|
9 |
Q. Jiang, J. Ma, Z. Ma and G. Li, “A privacy enhanced authentication scheme for telecare medical information systems” Journal of Medical Systems, vol. 36, no. 3, pp 1529-1535, 2012.
DOI
|
10 |
P. Kumar, S. G. Lee and H. J. Lee, "E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks" in Proceeding of the Sensors2012 Transactions, pp. 1625-1647, 2012.
|
11 |
Y. D. Joo, “Security Improvements on Smart-Card Based Mutual Authentication Scheme” Webcasting, Journal of The Internet and Telecommunication, vol. 12, no. 6, pp. 91-98, 2012.
DOI
|
12 |
K. Y. Choi, J. Y.Hwang and D. H.Lee, "ID-based Authenticated Group Key Agreement Secure against insider Attacks" in Proceeding of the IEICE Transactions. Fundamentals, vol. E91-A, no. 7, pp. 1828-1830, 2008.
|
13 |
Y. Yu,. "Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage" in Proceeding of the Network and System Security Transactions, Springer International Publishing, pp. 28-40, 2014.
|
14 |
A. Shamir, "How to share a secret." , in Proceeding of the Communications of the ACM Transactions, pp. 612-613, Nov, 1979.
|
15 |
B. Libert and J. Quisquater, “New Identity Based Signcryption Schemes from Pairings” IEEE Information Theory Workshop, http://eprint.iacr.org/2003/023, 2003.
|
16 |
H. L. Chae, and P. J. Lee. "Remarks on convertible group signatures of Asiacrypt'96." Electronics Letters vol.33, no.5, pp383-384, 1997.
DOI
|