1 |
S. I. Yang, T. G. Lee, and S. H. Park, "Design of lightweight mobile middleware naive system," J. KCA, vol. 9, no. 9, pp. 41-50, 2009.
과학기술학회마을
DOI
|
2 |
J. S. Park, M. H Park, and S. H. Jung, "A whitelist-based scheme for detecting and preventing unauthorized AP access using mobile device," J. KICS, vol. 38B, no. 8, pp. 632-640, 2013.
과학기술학회마을
DOI
ScienceOn
|
3 |
Travis Broughton, Mobile Middleware for the Enterprise, Retrieved Oct 2013, from http://blogs.intel.com/application-security/2013/02/15/m obile-middleware-for-enterprise/
|
4 |
Doosan Corporation, Middleware, Retrieved Oct. 2013, from http://www.doopedia.co.kr
|
5 |
P. Bellavista and A. Corradi, The Handbook of Mobile Middleware, Auerbach Publications, 2007.
|
6 |
Intel White Paper, Mobile Middleware Buyer's Guide, Retrieved Oct. 2013, from https://cloudsecurity.intel.com/
|
7 |
Digital daily, MEAP(2011), Retrieved Aug. 2013, from http://www.ddaily.co.kr/news/news_view.php?uid=82366
|
8 |
S. M. Lee, K. I. Seo, and E. M. Choi, "Translation and adaptation technique for mobile software using AOP," J. Korea Institute of Information Scientists and Engineers Association, vol. 37, no. 1(B), pp. 59-63, 2010.
|
9 |
G. B. Lee, and B. S. Lee, "A study on RFID information protection with the modified ECC algorithm," J. Korea Institute of Information Scientists and Engineers Association, vol. 8, no. 3, pp. 77-85, 2010.
|