1 |
M. Weiser, "Some Computer Science Issues in Ubiquitous Computing," Communications of the ACM, vol. 36, no. 7, 1993, pp. 75-84.
DOI
|
2 |
K. Kim, K. Ban, S. Heo, and E. Kim, "Design and Implementation of System for Sensing Data Collection in RFID/USN," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 2, 2010, pp. 221-226.
과학기술학회마을
|
3 |
J.-H. Shin and S.-S. Hwang, "Design of RFID Packaging for Construction Materials," J. of The Korea Institute of Electronic Communication Sciences, vol. 8, no, 6, 2013, pp. 923-932.
DOI
|
4 |
W.-S. Ryu, "A Simulation Technique for RFID Adoption in Hospital," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 1, 2014, pp. 61-66.
과학기술학회마을
DOI
|
5 |
A. Juels, "Strengthening EPC Tags Against Cloning," ACM Workshop on Wireless Security, Cologne, Germany, Sept. 2005, pp. 67-76.
|
6 |
S.-J. Oh, K.-H. Chung, T.-J. Yun, and K.-S. Ahn, "An RFID Mutual Authentication Protocol Using One-Time Random Number," The J. of Korea Information of Communications and Information Sciences, vol. 36, no. 7, 2011, pp. 858-867.
과학기술학회마을
DOI
|
7 |
M. S. Masuda, "New Approach to Chaotic Encryption," Physics Letters A, vol. 263, 1999, pp. 373-375.
DOI
|
8 |
J. Cheng and J.-I. Guo "A new chaotic key-based design for image encryption and decryption," The 2000 IEEE Int. Symp. on Circuits and Systems, Geneva, Switzerland, May 2000, pp. 49-52.
|
9 |
H. E. Ahmed, H. M. Kalash, and O. S. Farag Allah, "An Efficient Chaos-Based Feedbacks Stream Cipher (ECBFSC) for Image Encryption and Decryption," Informatica, vol. 31, 2007, pp. 121-129.
|
10 |
A. H. Nayfeh and B. Balachandran, Applied Nonlinear Dynamics, Toronto: Wiley-Interscience, 1995.
|
11 |
R. H. Abraham, and C. D. Shaw, Dynamics - The Geometry of Behavior. California: Addison-Wesley, 1992.
|
12 |
G. P. Williams, Chaos Theory Tamed. London: Taylor & Francis, 1997.
|
13 |
G.-S. Yim and H.-S. Kim, "Chaos-based Image Encryption Scheme using Noise-induced Synchronization," J. of the Korea Society of Computer and Information, vol. 13, no. 5, 2008, pp. 155-162.
과학기술학회마을
|
14 |
G.-S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System," Korea Information Assurance Society, 2008, vol 8. no. 3, pp. 57-64.
과학기술학회마을
|
15 |
H.-S. Kim and G.-S. Yim, "Design of a digital photo frame for close-range security using the chaotic signals synchronization," J. of the Korea Society of Computer and Information, vol. 16, no. 2, 2011, pp. 201-206.
과학기술학회마을
DOI
|
16 |
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identifications Systems," Int. Conf. on Security in Pervasive Computing, Boppard, Germany, Mar. 2003.
|
17 |
H. G. Schuster, Deterministic Chaos an Introduction 2nd, Weinheim: VCH, 1988.
|
18 |
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems," Int. J. of computer Applications, vol. 28, no. 9, 2004, pp. 719-724.
|