no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An efficient thread partition policy for secure functional language
|
Jo, SunMoon |
|
2014 |
11 |
3 |
p. 165-171 |
article |
2 |
Association analysis of technology convergence based on information system utilization
|
Shin, Sumi |
|
2015 |
11 |
3 |
p. 173-179 |
article |
3 |
A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography
|
Jeong, Yoon-Su |
|
2015 |
11 |
3 |
p. 137-142 |
article |
4 |
Authentication scheme for smart learning system in the cloud computing environment
|
Lee, Aeri |
|
2015 |
11 |
3 |
p. 149-155 |
article |
5 |
Banking behavior in security and multi-channel environment
|
Lee, Sang-Chul |
|
2015 |
11 |
3 |
p. 157-164 |
article |
6 |
Convergence security systems
|
Oh, Sang-Yeob |
|
2015 |
11 |
3 |
p. 119-121 |
article |
7 |
Efficient and secure DNS cyber shelter on DDoS attacks
|
Hong, Sunghyuck |
|
2014 |
11 |
3 |
p. 129-136 |
article |
8 |
Reconfigurable real number field elliptic curve cryptography to improve the security
|
Goo, Eun-Hee |
|
2014 |
11 |
3 |
p. 123-128 |
article |
9 |
Study on model fostering for cloud service brokerage
|
Choi, Sung |
|
2015 |
11 |
3 |
p. 181-192 |
article |
10 |
Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures
|
Kim, Jung-Hoon |
|
2015 |
11 |
3 |
p. 143-148 |
article |