Young B. Choi

According to our database1, Young B. Choi authored at least 25 papers between 2000 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle.
J. Medical Systems, 2016

2013
Effect of Web Caching on Load Time.
iJET, 2013

Future Direction for Next Generation Web.
iJET, 2013

2012
Nomadic Device Based CRL Acquisition Method for Vehicular Networks.
, 2012

2011
Security Implication in Virtualization.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security management in Wireless Sensor Networks for healthcare.
IJMC, 2011

RFID Implementation and Security Issues.
Proceedings of the Information Security and Assurance - International Conference, 2011

RFID and Supply Chain Management: Generic and Military Applications.
Proceedings of the Communication and Networking, 2011

2010
Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

State of the Art of Network Security Perspectives in Cloud Computing.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Feasibility of virtual security laboratory for three-tiered distance education.
Proceedings of the 11th Conference on Information Technology Education, 2010

2009
A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies.
IJMC, 2009

A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems.
EG, 2009

Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management.
Proceedings of the Communication and Networking, 2009

2007
The pricing of wireless phone services in the USA: issues and development trends.
IJMC, 2007

2006
Challenges Associated with Privacy in Health Care Industry: Implementation of HIPAA and the Security Rules.
J. Medical Systems, 2006

International telecommunications service management.
IJSS, 2006

Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance.
IJMC, 2006

A connection-oriented telecommunications disaster management model using mobile GIS.
IJMC, 2006

Telemedicine in the USA: standardization through information management and technical applications.
IEEE Communications Magazine, 2006

2005
A quantification model using P3P in privacy control for telecommunications service management.
IJSS, 2005

Applications of ''human factors'' in wireless telecommunications service delivery.
IJSS, 2005

Management of Telecommunications Services: A Vital New Content Area and a Course Model for the College of Business.
IJICTE, 2005

The Applications of Human Factors Associated with Hearing Impairments: Issues and Recent Technological Developments in Telecommunications.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2000
A Design of the Hybrid Messaging System (HMS) Based on PKI.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000


  Loading...