|
1 |
A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing
Cheon, EunHong;Lee, YonSik;
/
Korea convergence Security Association
, v.15, no.5, pp.3-8,
|
|
2 |
A Study of Security Risk Analysis for Public IaaS Cloud Certification
Kim, Sun-Jib;Kim, Ki-Young;
/
Korea convergence Security Association
, v.15, no.5, pp.9-15,
|
|
3 |
A Study on improvement for a means of access to electronic financial service
Han, Se Jin;
/
Korea convergence Security Association
, v.15, no.5, pp.17-22,
|
|
4 |
Mobile exercise monitoring for personalized exercise prescription
Kang, Sunyoung;Kang, Seungae;
/
Korea convergence Security Association
, v.15, no.5, pp.23-28,
|
|
5 |
A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment
Noh, SiChoon;Kim, Jeom goo;
/
Korea convergence Security Association
, v.15, no.5, pp.29-35,
|
|
6 |
Log Storage Scheme Considering Log Transmission Based on Time-Delayed Key Disclosure
Kang, Seok-Gyu;Park, Chang-Seop;
/
Korea convergence Security Association
, v.15, no.5, pp.37-45,
|
|
7 |
Obesity management Protocol based physical activity promotion system(PAPS) for obese children
Kang, Sunyoung;
/
Korea convergence Security Association
, v.15, no.5, pp.47-52,
|
|
8 |
A study on the direction of security control of IoT environment
Koh, Keunho;Lee, Sungryoul;Ahn, Seongjin;
/
Korea convergence Security Association
, v.15, no.5, pp.53-59,
|
|
9 |
North Korea's negotiating tactics and the corresponding direction -Based on the agreement concluded by inter-Korean high-level contacts-
Kim, Gyu Nam;Lee, hyun Hee;
/
Korea convergence Security Association
, v.15, no.5, pp.61-70,
|
|
10 |
A Proposal for amendment of the Financial Intelligence Unit Law
Lee, Dae Sung;Ahn, Young Kyu;
/
Korea convergence Security Association
, v.15, no.5, pp.71-76,
|
|
11 |
A Study on Insider Behavior Scoring System to Prevent Data Leaks
Lim, Young-Hwan;Hong, Jun-Suk;Kook, Kwang Ho;Park, Won-Hyung;
/
Korea convergence Security Association
, v.15, no.5, pp.77-86,
|
|
12 |
A study on the Privacy threats factors of Cloud Services
Jeon, Jeong Hoon;
/
Korea convergence Security Association
, v.15, no.5, pp.87-95,
|
|
13 |
Empirical Analysis of the Relationship between a Market and Technological Characteristics and Performance of the Activities of Technology Security
Kim, Kyung Sun;Cho, Kuen Tae;
/
Korea convergence Security Association
, v.15, no.5, pp.97-105,
|
|