1 |
J. Andreoni, and H. Varian, 'Pre-play Contracting in the Prisoners' Dilemma', mimeo, University of Wisconsin, 1999
|
2 |
Bao, F., R. Deng and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. 1998 IEEE Symposium on Security and Privacy. Oakland, IEEE Compute Society. pp. 77-85. 1998
|
3 |
박종민, 김용훈, 조범준, '타인의 관찰에서 안전한 패스워드 시스템', 한국해양정보통신학회 논문지, 제8권 제8호, pp.1790-1795, 2004
|
4 |
Neil Haller. The s/key(tm) one-time password system. Symposium on Network and Distributed System Security, pp.151-157, February 1994
|
5 |
박중길, 장태주, 박봉주, 류재철, '시간을 이용한 효율적인 일회용 패스워드 알고리즘', 한국 정보처리학회 논문지, 제8-c권 제4호, pp.373-378, 2001
|
6 |
Bensaid, B. and R.J. Cary-Bobo, 'An Exact Formula for the Lion's Share: A Model of Pre-Play Negotiation,' Games and Economic Behavior, 14, pp.44-89, 1996
DOI
ScienceOn
|
7 |
E. Moulines, P. Duhamel, J.F. Cardoso, and S. Mayrargue, Subspace methods for the blind identification of multichannel fir filters, IEEE Transactions on Signal Processing, SP-43, pp. 516-525, 1995
|
8 |
양대헌, 이석준, '무선 인터넷을 위한 패스워드 기반의 인증 및 키 교환 프로토콜', 한국정보과학회 논문지, 제29권 제3호, pp.324-332, 2002
|
9 |
Neil Haller. The s/key(tm) one-time password system. In Proceedings of the 1994 Symposium on Network and Distributed System Security, pp.151-157, 1994
|
10 |
A. Hill, A. D. Brett, and C. J. Taylor, 'Automatic landmark identification using a new method of non-rigid correspondence' in Proceedings of IPMI '97 Conference, vol. 1230, pp. 483-488, 1997
|
11 |
A. W. Senior and A. J. Robinson. An off-line cursive handwriting recognition system. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(3) pp.309-321, 1998
DOI
ScienceOn
|