1 |
Eun Young Choi, Mi joo Kim, and Hyun Cheol Jung, "A study for enhancing smartphone security," KSII, pp.781-785, 2010.
|
2 |
Dea-Woo Park, "Smartphone Copyright and Forensic Application Method," 2010's Illegal Copies Enforcement Related Agenci es joint Workshops, Korea Copyright Commission, 2010. 5.
|
3 |
Gyu-an Lee, Dea-Woo Park, Cheong-Sim Go, "Digital Forensics for Forensic Science," GSInterVision, 2011. 2.
|
4 |
Chung Hyun Jung, Kim Hee Yeon, "Kakao Talk, Phishing Safety Zone? "Not Phishing," ZDnet korea, http://www.zdnt.co.kr/news/news_view.asp?artice_id= 20120322114832, 2012. 3.
|
5 |
International Data Corporation, "Worldwid Smart Phone OS Market Share, 2012Q3," idc.com, 2012.
|
6 |
Jin-whan Kim, Hyuk-gyo Cho, Chang-Ji n, Seo, Eui-young Cha, "Mobile Impleme ntat ion of Enhanced Dynamic Signature Verifi cation for the Smart-phone," KIICE, v.11, no.9, pp.1781-1785, 2007.
|
7 |
S. P. Oh, I. H. Choi, "A Study on Compar ison and Analysis for Smart Phone's OS and feature," IEEK, v.33, no.1, pp. 2002-2007, 2010.
|
8 |
Kim dong-min, Lee chil-woo, "Technolog y Trends of Smartphone User Interface," KIISE, v.28, no.5, pp.15-26, 2010.
|