J. E. Song, S. H. Kim, M. A. Jung and K. I. Jung, “Medical information securiey of u-Healthcare service” Journal of The Korean Institute of Communications and Information Sciences, vol. 17, no. 1, pp. 47~56, 2007.
K. J. Kim and S. P. Hong, “Privacy Information Protection Model in e-Healthcare Environment” Journal of The Korean Society for Internet Informatin, vol. 10, no. 2, 2008.
Wong, K. Chung, G. Mohamed, and S. L. Simon,Lam. "Secure group communications using key graphs." in Proceeding of the IEEE/ACM Transactions, vol. 8. no. 1, pp.16-30, 2000.
Q. D Vu, B. N. Thai, and Een-Kee Hong. "A New Scheme for Multi-user Cooperation System Based on Iterative Decoder"in Proceeding of the KICIS Transactions. pp. 39-40. 2011.
J. H. Lee, J. S. Yu, H. J. Yoon and H.J Jang, “ System for Protecting Medical Informatio” Journal of The Korean Society for Internet Informatin, pp. 429-434, 2010.
Q. Jiang, J. Ma, Z. Ma and G. Li, “A privacy enhanced authentication scheme for telecare medical information systems” Journal of Medical Systems, vol. 36, no. 3, pp 1529-1535, 2012.
P. Kumar, S. G. Lee and H. J. Lee, "E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks" in Proceeding of the Sensors2012 Transactions, pp. 1625-1647, 2012.
Y. D. Joo, “Security Improvements on Smart-Card Based Mutual Authentication Scheme” Webcasting, Journal of The Internet and Telecommunication, vol. 12, no. 6, pp. 91-98, 2012.
Y. B. Cho, S. H. Woo and S. H Lee, “ IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment” Journal of The Korean Institute of Communications and Information Sciences, vol 38B, no. 10, pp. 801-807, 2013.
Y. D. Joo and Y. H. An, “Improvements of a Dynamic ID-Based Remote User Authentication Scheme” Journal of The Institute of Webcasting, Internet and Telecommunication, vol. 11, no. 6, pp. 303-310, 2011.
Y. B. Cho, and S. H Lee, “An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment” Journal of The Korean Institute of Communications and Information Sciences, vol. 37B, no.3, pp. 149-157, 2013.
K. Y. Choi, J. Y.Hwang and D. H.Lee, "ID-based Authenticated Group Key Agreement Secure against insider Attacks" in Proceeding of the IEICE Transactions. Fundamentals, vol. E91-A, no. 7, pp. 1828-1830, 2008.
Y. Yu,. "Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage" in Proceeding of the Network and System Security Transactions, Springer International Publishing, pp. 28-40, 2014.
A. Shamir, "How to share a secret." , in Proceeding of the Communications of the ACM Transactions, pp. 612-613, Nov, 1979.
B. Libert and J. Quisquater, “New Identity Based Signcryption Schemes from Pairings” IEEE Information Theory Workshop, http://eprint.iacr.org/2003/023, 2003.
H. L. Chae, and P. J. Lee. "Remarks on convertible group signatures of Asiacrypt'96." Electronics Letters vol.33, no.5, pp383-384, 1997.