Young B. Choi
Cited by
Cited by
Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules
YB Choi, KE Capitan, JS Krause, MM Streeper
Journal of medical systems 30, 57-64, 2006
Security issues on wireless body area network for remote healthcare monitoring
S Lim, TH Oh, YB Choi, T Lakshman
2010 IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2010
Telemedicine in the USA: standardization through information management and technical applications
YB Choi, JS Krause, H Seo, KE Capitan, K Chung
IEEE Communications Magazine 44 (4), 41-48, 2006
Toward a future wireless classroom paradigm
YB Choi, TA Abbott, MA Arthur, DN Hill
International Journal of Innovation and learning 4 (1), 14-25, 2007
The state-of-the-art of mobile payment architecture and emerging issues
YB Choi, RL Crowgey, JM Price, JS VanPelt
International Journal of Electronic Finance 1 (1), 94-103, 2006
Toward efficient medication error reduction: error-reducing information management systems
K Chung, YB Choi, S Moon
Journal of medical systems 27, 553-560, 2003
Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A.
S Tipton, Stephen J., Forkey, YB Choi
Journal of Medical Systems 40 (4), 1-8, 2016
A comparison and classification framework for disaster information management systems
J Ryoo, YB Choi
International Journal of Emergency Management 3 (4), 264-279, 2006
Role of Security in Social Networking
D Hiatt, YB Choi
The International Journal of Advanced Computer Science and Application …, 2016
Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance
YB Choi, J Muller, CV Kopek, JM Makarsky
International Journal of Mobile Communications 4 (3), 266-290, 2006
Applications of" human factors" in wireless telecommunications service delivery
YB Choi, JS Krause, MA Imperio, SP Macchio, KA Rill
International Journal of Services and Standards 1 (3), 287-298, 2005
iOS security and privacy: Authentication methods, permissions, and potential pitfalls with touch id
SJ Tipton, DJ White II, C Sershon, YB Choi
International Journal of Computer and Information Technology 3 (03), 2014
State of the art of network security perspectives in cloud computing
TH Oh, S Lim, Y B. Choi, KR Park, H Lee, H Choi
Security-Enriched Urban Computing and Smart Grid: First International …, 2010
Cookies and sessions: a study of what they are, how they work and how they can be stolen
K LaCroix, YL Loo, YB Choi
2017 International conference on software security and assurance (ICSSA), 20-24, 2017
An efficient periodic broadcasting scheme for mobile video-on-demand system
YQ Gui, E Jung, Y Choi, HK Choi
Fourth International Conference on Information Technology (ITNG'07), 888-889, 2007
Security management in Wireless Sensor Networks for healthcare
T Oh, YB Choi, J Ryoo, K Stokes
International Journal of Mobile Communications 9 (2), 187-207, 2011
Feasibility of virtual security laboratory for three-tiered distance education
YB Choi, S Lim, TH Oh
Proceedings of the 2010 ACM conference on Information technology education …, 2010
Supply chain management for generic and military applications using RFID
TH Oh, YB Choi, R Chouta
International Journal of Future Generation Communication and Networking 5 (1 …, 2012
A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies
J Ryoo, YB Choi, TH Oh, G Corbin
International Journal of Mobile Communications 7 (2), 253-267, 2009
Organizational cyber data breach analysis of facebook, equifax, and uber cases
YB Choi
International Journal of Cyber Research and Education (IJCRE) 3 (1), 58-64, 2021
The system can't perform the operation now. Try again later.
Articles 1–20