1 |
J.-D. Lim and J.-N. Kim, "A study on the trusted app.-based access control to the isolated trusted execution environment in mobile device," in Proc. KICS Int. Conf. Commun., pp. 364-365, Jun. 2014.
|
2 |
W.-J. Lee, K.-W. Kim, K.-D. Bu, and J. Woo, "A study on the adoption of NAC for guaranteeing reliability of u-Campus network," J. KIIT, vol. 7, no. 4, 2009.
|
3 |
J. Bickford, R. O' Hare, A. Baliga, V. Ganapathy, and L. Iftode, " Rootkits on smart phones: Attacks, implications and opportunities," in HotMobile'10, ACM, Feb. 2010.
|
4 |
S. H. Paik, S.-K. Kim, and H. B. Park, "Design and implementation of network access control for security of company network," J. IEEK, vol. 47, no. 12, Dec. 2010.
|