1 |
Jeonghoon Han, "Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria" Korea Information Processing Society Journal, vol 15, c, pp125- 132, 2008.4.
과학기술학회마을
DOI
ScienceOn
|
2 |
Telecommunications Technology Association of Korea "HTML5 Techniques for ActiveX Replacement" Telecommunications Technology Associations 2011.12.22
|
3 |
Jeon Jeong Hoon 11others "Cryptography & Network Security 5th", pp.283-347, Green 2011.
|
4 |
Broadcasting and Communications Commission Press release 2012.4.2.
|
5 |
Adams & Lloyd "Understanding Public-Key Infrastructure" Macmillan Technical Publishing, 1999.
|
6 |
National Cyber Security Center "ActiveX controls' at installation hacking vulnerabilities for Web Services" NCSC-TR050017
|
7 |
ITSTAT "Proportion of Internet banking transactions" http://www.itstat.go.kr/stat/graph View.htm?mclass_cd=JB3&detail=4
|
8 |
Su Yong Kim, Ki wook Sohn "The Study of technique to find and prove vulnerabilities in ActiveX Control", National Security Research Institute Vol. 15, No 6, pp.3-12, 2005.12
|
9 |
Jeon Jeong Hoon, "A Study of the Performance Degradation Factors of An Internal Network", Korea Institute of Communications and Information Sciences Vol. 36, No. 1, 2011.1
과학기술학회마을
DOI
ScienceOn
|
10 |
Richard E. Smith "Authentication" Addison-Wesley, 2002.
|
11 |
Kim Min Jea 4 others, "A Method for Vulnerability Analysis of ActiveX Modules for Internet Services using Fuzzing Techniques", Korea IT Industry Promotion Agency Conference vol.36, no.2(D). pp46-49, 2009.
|
12 |
KIPA "Electronic Payment 2.0 Payment 2.0 Market Trends" 2008.8
|
13 |
Kim, Boo Hyun , Yeo, Jungsung , "An Analysis of the Use of Cellular-phone's micro payment" Consumer policy and education review, Vol. 5, No. 2, pp.63-79, 2009.6.
|