References
- NEWS1, http://news1.kr/articles/?1906344
- OpenNet, http://opennet.or.kr/e-finance-e-signature-reform.pdf
- Chosun Biz, http://biz.chosun.com/site/data/html_dir/2015/04/20/2015042003040.html
- Data Net, http://www.datanet.co.kr/news/articleView.html?idxno=81727
- Digital Times, http://www.dt.co.kr/contents.html?article_no=2015041402100351800001
- Gyeongbuk Dohmin Ilbo, http://www.hidomin.com/news/articleView.html?idxno=249918
- Gyeongbuk Dohmin Ilbo, http://www.hidomin.com/news/articleView.html?idxno=249918
- Asian Economy, http://view.asiae.co.kr/news/view.htm?idxno=2015032509531946839
- Naver, http://terms.naver.com/entry.nhn?docId=2118001&cid=42107&categoryId=42107
- IT Today, http://www.ittoday.co.kr/news/articleView.html?idxno=59377
- Jae-Kyung Park, Sang-Yong Choi, "Studing Security Weaknesses of Android System", International Journal of Security and Its Applications, Vol. 9, No.3, pp. 7-12, 2015. https://doi.org/10.14257/ijsia.2015.9.3.02
- Jae-Kyung Park, "A Realtime Malware Detection Technique Using Multiple Filter", Journal of The Korea Society of Computer and Information, Vol. 19, No.7, pp. 77-85, July 2014. https://doi.org/10.9708/jksci.2014.19.7.077
- Hyo-Nam Kim, "Realtime hybrid analysis based on multiple profile for prevention of malware", Hongik Univ. Feb. 2014.
- Seongmin Yoo, Jinseung Yu, Haegjin Jang and Jaecheol Ryou, "A Study on OTP Generation Method based on Software", Journal of the HCI Society of Korea, HCI 2011, No. 1, pp. 173-176, 2011.
- Sangyoung Choi, "Trend of mobile malware spreading and responding", Journal of The Korea Society of Computer and Information, v.22 No. 1, pp. 1-6, 2014. https://doi.org/10.9708/JKSCI.2017.22.01.001
- Gyeongyong Heo, Imgeun Lee, Some Sick Park, Young Woon Woo, "Development of Genuine Product Authentication Framework and Genuine Distinction Algorithm Using Design QR Code", Journal of The Korea Society of Computer and Information, v.20 No. 6, pp. 13-20, 2015. https://doi.org/10.9708/JKSCI.2015.20.6.013