Vulnerability Analysis and Countermeasure of Telemedicine System Using Bio-Authentication
Vol. 33, No. 2, pp. 40-47, Feb. 2008
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
Y. Hwang, Y. Lee, D. Park, Y. Shin, "Vulnerability Analysis and Countermeasure of Telemedicine System Using Bio-Authentication," The Journal of Korean Institute of Communications and Information Sciences, vol. 33, no. 2, pp. 40-47, 2008. DOI: .
[ACM Style]
Yu-dong Hwang, You-ri Lee, Dong-gue Park, and Yong-Nyuo Shin. 2008. Vulnerability Analysis and Countermeasure of Telemedicine System Using Bio-Authentication. The Journal of Korean Institute of Communications and Information Sciences, 33, 2, (2008), 40-47. DOI: .
[KICS Style]
Yu-dong Hwang, You-ri Lee, Dong-gue Park, Yong-Nyuo Shin, "Vulnerability Analysis and Countermeasure of Telemedicine System Using Bio-Authentication," The Journal of Korean Institute of Communications and Information Sciences, vol. 33, no. 2, pp. 40-47, 2. 2008.