Integrating Logo into the Secondary Mathematics Curriculum, Proceedings of LOGO and Mathematics Education Conference, 1991. ,
Exploring infinite processes through Logo programming activities of recursive and fractal figures, EUROLOGO Conference, vol.10, 2005. ,
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment, LNCS, vol.3842, pp.741-748, 2006. ,
DOI : 10.1007/11610496_100
Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment, ICICA 2010. CCIS, pp.72-79, 2010. ,
DOI : 10.1007/11424826_122
Secure UHF/HF Dual-Band RFID : Strategic Framework Approaches and Application Solutions, ICCCI 2011, 2011. ,
DOI : 10.1007/978-3-642-23935-9_48
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.476.2050
Implementation of terminal middleware platform for mobile RFID computing, International Journal of Ad Hoc and Ubiquitous Computing, vol.8, issue.4, pp.205-219, 2011. ,
DOI : 10.1504/IJAHUC.2011.043583
Programming language LOGO in school mathematics and teacher training, Proceedings of PME Conference, 1997. ,
Creating and Testing Textbooks for Secondary Schools -An Example: Programming in LOGO, Lecture Notes in Computer Science, issue.5090, 2008. ,
Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment, ICCCI 2010, pp.193-202, 2010. ,
DOI : 10.1007/978-3-642-16732-4_21
Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device, Communications in Computer and Information Science, vol.206, pp.467-474, 2011. ,
DOI : 10.1007/11424826_122
Secure Data Access Control Scheme Using Type-Based Reencryption in Cloud Environment, Studies in Computational Intelligence, vol.381, pp.319-327, 2011. ,
DOI : 10.1007/978-3-642-23418-7_28
Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption, WASA 2010, pp.245-252, 2010. ,
DOI : 10.1007/978-3-642-14654-1_30
The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader, The Journal of Korea Information and Communications Society, vol.35, issue.5, pp.785-793, 2010. ,