Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules YB Choi, KE Capitan, JS Krause, MM Streeper Journal of medical systems 30, 57-64, 2006 | 171 | 2006 |
Security issues on wireless body area network for remote healthcare monitoring S Lim, TH Oh, YB Choi, T Lakshman 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2010 | 125 | 2010 |
Telemedicine in the USA: standardization through information management and technical applications YB Choi, JS Krause, H Seo, KE Capitan, K Chung IEEE Communications Magazine 44 (4), 41-48, 2006 | 98 | 2006 |
Toward a future wireless classroom paradigm YB Choi, TA Abbott, MA Arthur, DN Hill International Journal of Innovation and learning 4 (1), 14-25, 2007 | 66 | 2007 |
The state-of-the-art of mobile payment architecture and emerging issues YB Choi, RL Crowgey, JM Price, JS VanPelt International Journal of Electronic Finance 1 (1), 94-103, 2006 | 54 | 2006 |
Toward efficient medication error reduction: error-reducing information management systems K Chung, YB Choi, S Moon Journal of medical systems 27, 553-560, 2003 | 43 | 2003 |
Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. S Tipton, Stephen J., Forkey, YB Choi Journal of Medical Systems 40 (4), 1-8, 2016 | 35* | 2016 |
A comparison and classification framework for disaster information management systems J Ryoo, YB Choi International Journal of Emergency Management 3 (4), 264-279, 2006 | 30 | 2006 |
Role of Security in Social Networking D Hiatt, YB Choi The International Journal of Advanced Computer Science and Application …, 2016 | 26 | 2016 |
Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance YB Choi, J Muller, CV Kopek, JM Makarsky International Journal of Mobile Communications 4 (3), 266-290, 2006 | 26 | 2006 |
Applications of" human factors" in wireless telecommunications service delivery YB Choi, JS Krause, MA Imperio, SP Macchio, KA Rill International Journal of Services and Standards 1 (3), 287-298, 2005 | 26 | 2005 |
iOS security and privacy: Authentication methods, permissions, and potential pitfalls with touch id SJ Tipton, DJ White II, C Sershon, YB Choi International Journal of Computer and Information Technology 3 (03), 2014 | 16 | 2014 |
State of the art of network security perspectives in cloud computing TH Oh, S Lim, Y B. Choi, KR Park, H Lee, H Choi Security-Enriched Urban Computing and Smart Grid: First International …, 2010 | 16 | 2010 |
Cookies and sessions: a study of what they are, how they work and how they can be stolen K LaCroix, YL Loo, YB Choi 2017 International conference on software security and assurance (ICSSA), 20-24, 2017 | 13 | 2017 |
An efficient periodic broadcasting scheme for mobile video-on-demand system YQ Gui, E Jung, Y Choi, HK Choi Fourth International Conference on Information Technology (ITNG'07), 888-889, 2007 | 12 | 2007 |
Feasibility of virtual security laboratory for three-tiered distance education YB Choi, S Lim, TH Oh Proceedings of the 2010 ACM conference on Information technology education …, 2010 | 10 | 2010 |
Security management in Wireless Sensor Networks for healthcare T Oh, YB Choi, J Ryoo, K Stokes International Journal of Mobile Communications 9 (2), 187-207, 2011 | 9 | 2011 |
Supply chain management for generic and military applications using RFID TH Oh, YB Choi, R Chouta International Journal of Future Generation Communication and Networking 5 (1 …, 2012 | 8 | 2012 |
A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies J Ryoo, YB Choi, TH Oh, G Corbin International Journal of Mobile Communications 7 (2), 253-267, 2009 | 8 | 2009 |
Organizational cyber data breach analysis of facebook, equifax, and uber cases YB Choi International Journal of Cyber Research and Education (IJCRE) 3 (1), 58-64, 2021 | 7 | 2021 |