|
1 |
Design and Analysis of the Log Authentication Mechanism based on the Merkle Tree
Lee, Jung yeob;Park, Chang seop;
/
Korea convergence Security Association
, v.17, no.1, pp.3-13,
|
|
2 |
A Network Analysis of the Research Trends in Fingerprints in Korea
Jung, Jinhyo;Lee, Chang-Moo;
/
Korea convergence Security Association
, v.17, no.1, pp.15-30,
|
|
3 |
An Intrusion Detection System based on the Artificial Neural Network for Real Time Detection
Kim, Tae Hee;Kang, Seung Ho;
/
Korea convergence Security Association
, v.17, no.1, pp.31-38,
|
|
4 |
The Study on Corporate Information Security Governance Model for CEO
Kim, Do Hyeong;
/
Korea convergence Security Association
, v.17, no.1, pp.39-44,
|
|
5 |
The Normative Meaning of Cybersecurity Information Sharing Act(CISA) of 2015
Park, Sangdon;
/
Korea convergence Security Association
, v.17, no.1, pp.45-52,
|
|
6 |
ECQV Certificate Based Security Mechanism for End-to-End Security in IoT
Yeon, Han-Beol;Park, Chang seop;
/
Korea convergence Security Association
, v.17, no.1, pp.53-61,
|
|
7 |
Scenario for sudden change in North Korea! : Comparing North Korea with countries of Jasmine Revolution
Lee, Dae Sung;
/
Korea convergence Security Association
, v.17, no.1, pp.63-68,
|
|
8 |
The Study on the Government's North Korea Policy through Game Theory
Ryu, Ho-Kuk;Lim, Gye-Hwan;
/
Korea convergence Security Association
, v.17, no.1, pp.69-79,
|
|
9 |
Improvements of Legal System for Security Enhancement of Korean National Assembly' Attending System
Choi, Kwan;Kim, Minchi;
/
Korea convergence Security Association
, v.17, no.1, pp.81-88,
|
|
10 |
The Effect of Business Resource of the Members in Airport Special Guard's firms on the Business Attitude and Turnover Intention
Kim, Jin Hwan;
/
Korea convergence Security Association
, v.17, no.1, pp.89-100,
|
|
11 |
The Use of Internet of Things and Innovation of the Private Security
Gong, Bae Wan;
/
Korea convergence Security Association
, v.17, no.1, pp.101-109,
|
|