1 |
S. C. Lee & W. Y. Chung. (2014). A robust wearable u-healthcare platform in wireless sensor network. Journal of Communications and Networks, 16, 4, 465-474. DOI : 10.1109/jcn.2014.000077
DOI
|
2 |
T. W. Kim, K. H. Park, S. H. Yi & H. C. Kim. (2014). A Big Data Framework for u-Healthcare Systems Utilizing Vital Signs. Proceedings of the 2014 International Symposium on Computer, Consumer and Control(IS3C), 494-497. DOI : 10.1109/is3c.2014.135
DOI
|
3 |
F. Touati, R. Tabish & A. Ben Mnaouer. (2014). Towards u-health: An indoor 6LoWPAN based platform for real-time healthcare monitoring. Proceedings of the 2013 6th Joint IFIP Wireless and Mobile Networking Conference(WMNC), 1-4. DOI : 10.1109/wmnc.2013.6548958
DOI
|
4 |
Y. S. Lee, N. Bruce, T. Non, E. Alasaarela & H. Lee. (2015). Hybrid Cloud Service Based Healthcare Solutions. Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 25-30. DOI : 10.1109/waina.2015.42
DOI
|
5 |
H. Pan. J, J. H. Kim, K. Y. Chun & J. K. Ryu. (2013). Design of Portable Healthcare Gateway for Patient with Chronic Disease. Proceedings of the 2013 International Conference on Information Science and Applications (ICISA), 1-2. DOI : 10.1109/icisa.2013.6579337
DOI
|
6 |
H. Hu, Y. Wen, T. S. Chua & X. Li. (2014). Toward Scalable Systems for Big Data Analytics: A Technology Tutorial. IEEE Access, 2, 652-687. DOI : 10.1109/access.2014.2332453
DOI
|
7 |
G. L. Prakash, Dr. M. Prateek & Dr. I. Singh. (2014). Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System. International Journal Of Engineering And Computer Science, 3, 4, 5216-5223. DOI : 10.1109/icspct.2014.6884895
DOI
|
8 |
S. Nagaraj, Dr. G. S. V. P. Raju & V. Srinadth. (2015). Data Encryption and Authentication Using Public Key Approach. Elsevier Procedia Computer Science, 48, 126-132. DOI : 10.1016/j.procs.2015.04.161
DOI
|
9 |
A. K. Dubey, A. K. Dubey, M. Namdev & Shiv Shakti Shrivastava. (2016). Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment. IEEE, 1-8. DOI : 10.1109/CONSEG.2012.6349503.
DOI
|
10 |
V. S. Mahalle & A. K. Shahade. (2016). Enhancing the data security in Cloud by implementing Hybrid (Rsa & Aes) Encryption Algorithm. IEEE, 146-149. DOI : 10.1109/INPAC.2014.6981152.
DOI
|
11 |
S. Verma & D. Garg. (2015). Improvement in Rebalanced CRT RSA. The International Arab Journal of Information Technology, 12, 6, 524-531.
|
12 |
Y. S. Jeong. (2012). RFID-based Authentication Protocol for Implantable Medical Device. The Journal Of Digital Policy & Management, 10, 2, 141-146.
|
13 |
Y. S. Jeong & S. H. Lee. (2012). u-Healthcare Service Authentication Protocol based on RFID Technology. The Journal Of Digital Policy & Management, 10, 2, 153-160.
|
14 |
Y. S. Jeong & S. H. Lee. (2012). U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information. The Journal of Korea Information and Communications Society(J-KICS), 37, 4, 277-353. DOI : 10.7840/kics.2012.37c.4.297
DOI
|
15 |
D. G. Kim & I. G. Song. (2009). Need and Development of u-Healthcare Service. Korean Society for Internet Information, 1, 3, 9-17.
|