1 |
N. Ryu, K. Ban, S. Song, and E. Kim, "Design and Implementation of 3D Visualization Information System with RFID Tag Data," J. of the Korea Institute of Electronic Communication Sciences, vol. 2, no. 4, Dec. 2007, pp. 223-228.
|
2 |
K. Kim, K. Ban, S. Heo, and E. Kim, "Design and Implementation of System for Sensing Data Collection in RFID/USN," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 2, Mar. 2010, pp. 221-226.
|
3 |
J. Suk, K. Sun, and I. Ryoo, "An Enhanced System Security Structure for USN Environment," J. of Knowledge Information Technology and Systems, vol. 11, no. 5, Oct. 2016, pp. 489-497.
|
4 |
J. Oh, H. Kim, and J. Choi, "Vulnerability analysis and Design of RFID Security Protocols," J. of Korea Information Science Society, vol. 33, no. 2(C), Oct. 2006, pp. 497-502.
|
5 |
S. Kim, S. Park, J. Ku, and N. Kim, "A Trend Analysis of RFID/USN Industry," Electronics and telecommunications trends, vol. 20, no. 3, June 2005, pp. 43-55.
|
6 |
S. Hong and C. Lin, "A Multi-Protocol Gateway Middleware Design on Ubiquitous Sensor Networks," The J. of the korean Institute of communication and information sciences, vol. 38, no. 11, Nov. 2013, pp. 895-901.
|
7 |
H. Schuster, Deterministic Chaos: an Introduction: 2nd edition. Weinheim: WILEY-VCH, 2005.
|
8 |
A. Nayfeh, Applied Nonlinear Dynamics. New York: A Wiley-Interscience Publication, 1995.
|
9 |
E. Ott, Chaos in Dynamical Systems second edition. Maryland: Cambridge University Press, 2002.
|
10 |
G. Yim and H. Kim, "Chaos-based Image Encryption Scheme using Noise-included Synchronization," J. of the Korea Society of Computer and Information, vol. 13, no. 5, Sep. 2008, pp. 155-162.
|
11 |
K. Kim, K. Ban, N. Ryu, M. Jang, and E. Kim, "Design of RFID/USN Middleware for Poly-Context Process," J. of the Korea Institute of Electronic Communication Sciences, vol. 4, no. 2, June 2009, pp. 101-107.
|
12 |
G. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameter Chaotic System," J. of Korea Information Assurance Society, vol. 8, no. 3, Sept. 2008, pp. 57-64.
|
13 |
H. Kim and G. Yim, "Design of digital photo frame for close-range security using the chaotic signals synchronization,"J. of the Korea Society of Computer and Information, vol. 16, no. 2, Feb. 2011, pp. 201-206.
DOI
|
14 |
G. Yim, "Design of USN Communication Protocol Using Individual Chaotic Systems," J. of Korea Information Electron Communication Technology, vol. 8, no. 6, Dec. 2015, pp. 528-533.
|