Browse > Article List

논문
1 A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing
Cheon, EunHong;Lee, YonSik; / Korea convergence Security Association , v.15, no.5, pp.3-8,
2 A Study of Security Risk Analysis for Public IaaS Cloud Certification
Kim, Sun-Jib;Kim, Ki-Young; / Korea convergence Security Association , v.15, no.5, pp.9-15,
3 A Study on improvement for a means of access to electronic financial service
Han, Se Jin; / Korea convergence Security Association , v.15, no.5, pp.17-22,
4 Mobile exercise monitoring for personalized exercise prescription
Kang, Sunyoung;Kang, Seungae; / Korea convergence Security Association , v.15, no.5, pp.23-28,
5 A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment
Noh, SiChoon;Kim, Jeom goo; / Korea convergence Security Association , v.15, no.5, pp.29-35,
6 Log Storage Scheme Considering Log Transmission Based on Time-Delayed Key Disclosure
Kang, Seok-Gyu;Park, Chang-Seop; / Korea convergence Security Association , v.15, no.5, pp.37-45,
7 Obesity management Protocol based physical activity promotion system(PAPS) for obese children
Kang, Sunyoung; / Korea convergence Security Association , v.15, no.5, pp.47-52,
8 A study on the direction of security control of IoT environment
Koh, Keunho;Lee, Sungryoul;Ahn, Seongjin; / Korea convergence Security Association , v.15, no.5, pp.53-59,
9 North Korea's negotiating tactics and the corresponding direction -Based on the agreement concluded by inter-Korean high-level contacts-
Kim, Gyu Nam;Lee, hyun Hee; / Korea convergence Security Association , v.15, no.5, pp.61-70,
10 A Proposal for amendment of the Financial Intelligence Unit Law
Lee, Dae Sung;Ahn, Young Kyu; / Korea convergence Security Association , v.15, no.5, pp.71-76,
11 A Study on Insider Behavior Scoring System to Prevent Data Leaks
Lim, Young-Hwan;Hong, Jun-Suk;Kook, Kwang Ho;Park, Won-Hyung; / Korea convergence Security Association , v.15, no.5, pp.77-86,
12 A study on the Privacy threats factors of Cloud Services
Jeon, Jeong Hoon; / Korea convergence Security Association , v.15, no.5, pp.87-95,
13 Empirical Analysis of the Relationship between a Market and Technological Characteristics and Performance of the Activities of Technology Security
Kim, Kyung Sun;Cho, Kuen Tae; / Korea convergence Security Association , v.15, no.5, pp.97-105,