1 |
Luca, C. Claudio, M. and Stefano, Z., "Studying Bluetooth Malware Propagation: The BlueBag Project," IEEE Security & Privacy, pp.17-25, 2007
DOI
ScienceOn
|
2 |
M. Jacobsson, S. Wetzel, "Security Weaknesses in Bluetooth,"Proc. 2001 Conf. Topics Cryptology(CT-RSA01), Springer-verlag, pp.176-191, 2001
|
3 |
S. F. Hager and C. T. Midkiff, "Demonstrating Vulnerabilities in Bluetooth Security," Proc. IEEE Global Telecommunications Conf. (GLOBECOM03), Vol.3, IEEE CS Press, pp.1420-1424, 2003
|
4 |
John, M. and Laura. M. H, "Oscar surprise: Unsafe cellphones," Printed Version of The New York Times, 3rd March, 2005
|
5 |
개인정보보호 전문교육 - 개인정보보호 법률 및 사례, 한국정보보호진흥원, http://www.kisa.or.kr, 2007
|
6 |
문송천, 권 영철, "우리나라 개인정보 국내정보 국내 유출 실태 심각", 한국정보과학회지, 제22 권 제5호, pp.42-43, 2004
|
7 |
S. Garfinkel and A. Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security & Privacy, pp.17-27, 2003
DOI
ScienceOn
|