[PDF][PDF] Privacy and security issues for healthcare system with embedded rfid system on internet of things

JT Kim - Advanced Science and Technology Letters, 2014 - scholar.archive.org
Today, RFID technologies are being applied in ubiquitous sensor network system to improve
the quality of healthcare system. In this paper, we have investigated and surveyed on …

Analyses of characteristics of U-healthcare system based on wireless communication

JT Kim - Journal of information and communication …, 2012 - koreascience.kr
The medical industries are integrated with information technology with mobile devices and
wireless communication. The advent of mobile healthcare systems can benefit patients and …

[PDF][PDF] Analysis of RFID application for U-healthcare system in Internet of Things

JT Kim - International Journal of Smart Home, 2014 - gvpress.com
In the past years, Internet of Things (IoT) has been focused and fused with wireless sensor
node such as RFID, NFC tag and small sensor nodes, especially for hospital environment …

Privacy and security issues for RFID healthcare system in wireless sensor networks

JT Kim - Convergence and Hybrid Information Technology: 6th …, 2012 - Springer
RFID technologies are being applied in ubiquitous sensor network to improve the quality of
healthcare system. In this paper, we have investigated and surveyed on security and privacy …

Study on the performance improvement of active RFID System

JT Kim, JS Kim, KW Lee - The Journal of Korean Institute of …, 2015 - koreascience.kr
The improved DFSA for 2.4 GHz multi-tags active RFID is suggested in 2 different ways: 1)
simplified tag collection and Ack procedure using query command and 2) modified …

[PDF][PDF] Requirement of authentication between RFID tag and agent for applying u-healthcare system

JT Kim - Advanced Science and Technology Letter, 2013 - scholar.archive.org
A variety of security and privacy threats to RFID authentication protocols have been widely
studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking …

Privacy and Security Model for RFID Healthcare System in Wireless Communication Network

JT Kim - Journal of the Korea Institute of Information and …, 2012 - koreascience.kr
The use of a mobile agent in hospital environment offers an opportunity to deliver better
services for patients and staffs. Furthermore, medical errors will be reduced because M …

[图书][B] A quantitative descriptive study examining an integrated information technology system on improving access to educational resources

NC Washington - 2016 - search.proquest.com
Abstract Within the Academic Support Center (ASC) of a large community college located in
the mid-southern United States, educational resources are provided for eligible students …

[PDF][PDF] Security and privacy issues of element technologies on internet of things

JT Kim - Adv Sci Tech Lett, 2014 - scholar.archive.org
The meaning of Internet of Things (IoT) refers to unique identified objects which can interact
with other object through wireless and wired communication. The concept of Internet of …

Comparison of attacks and security analyses for different RFID protocols

JT Kim - IT Convergence and Security 2012, 2013 - Springer
RFID is a widely adopted in the field of identification technology these days. Radio
Frequency Identification (RFID) has wide applications in many areas including …