Young B. Choi

According to our database1, Young B. Choi authored at least 27 papers between 2000 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018

Cookies and Sessions: A Study of What They Are, How They Work and How They Can Be Stolen.
Proceedings of the International Conference on Software Security and Assurance, 2017

Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle.
J. Medical Syst., 2016

Effect of Web Caching on Load Time.
Int. J. Emerg. Technol. Learn., 2013

Future Direction for Next Generation Web.
Int. J. Emerg. Technol. Learn., 2013

Nomadic Device Based CRL Acquisition Method for Vehicular Networks.
Proceedings of the Convergence and Hybrid Information Technology, 2012

Security Implication in Virtualization.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security management in Wireless Sensor Networks for healthcare.
Int. J. Mob. Commun., 2011

RFID Implementation and Security Issues.
Proceedings of the Information Security and Assurance - International Conference, 2011

RFID and Supply Chain Management: Generic and Military Applications.
Proceedings of the Communication and Networking, 2011

Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

State of the Art of Network Security Perspectives in Cloud Computing.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Feasibility of virtual security laboratory for three-tiered distance education.
Proceedings of the 11th Conference on Information Technology Education, 2010

A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies.
Int. J. Mob. Commun., 2009

A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems.
Electron. Gov. an Int. J., 2009

Reeling in Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management.
Proceedings of the Communication and Networking, 2009

The pricing of wireless phone services in the USA: issues and development trends.
Int. J. Mob. Commun., 2007

Challenges Associated with Privacy in Health Care Industry: Implementation of HIPAA and the Security Rules.
J. Medical Syst., 2006

International telecommunications service management.
Int. J. Serv. Stand., 2006

Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance.
Int. J. Mob. Commun., 2006

A connection-oriented telecommunications disaster management model using mobile GIS.
Int. J. Mob. Commun., 2006

Telemedicine in the USA: standardization through information management and technical applications.
IEEE Commun. Mag., 2006

A quantification model using P3P in privacy control for telecommunications service management.
Int. J. Serv. Stand., 2005

Applications of ''human factors'' in wireless telecommunications service delivery.
Int. J. Serv. Stand., 2005

Management of Telecommunications Services: A Vital New Content Area and a Course Model for the College of Business.
Int. J. Inf. Commun. Technol. Educ., 2005

The Applications of Human Factors Associated with Hearing Impairments: Issues and Recent Technological Developments in Telecommunications.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

A Design of the Hybrid Messaging System (HMS) Based on PKI.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000