1 |
Ho-Won Lee, Soo-Bin Lee, "Research on N-Screen Cooperative Service Scenarios and Framework Considering Dynamic Reconfiguration of Web Contents", Global e-Business Association e-Business Study, Vol. 13, No. 3, pp. 461-480, Sep. 2012.
|
2 |
H. R. Mun, S. H. Kim, and B. H. Chung, "Analysis on Trends for Contents Sharing Technology", ETRI Electronics and Telecommunications Trends, Vol. 25, No 4, Aug. 2010.
과학기술학회마을
|
3 |
Kim, J., D. Lee, B. C. Jung, and J. Ahn, "Ontology based information distribution in the pervasive display environment", IEEE PERCOM'2010 Workshops, pp.171- 175, 2010.
|
4 |
Kim, J., U. Farman, S. Lee, S. Jo, H. Lee, and W. Ryu, "Dynamic addition and deletion of devices in N-screen environment", ICUFN, pp. 118-122, 2012.
|
5 |
Yoon, C., T. Um, and H. Lee, "Classification of N-Screen Services and its standardization", ICACT, pp. 597-602, 2012.
|
6 |
J. G. Choi, B. N. Noh, "Security Technology Research in Cloud Computing Environment", Journal of Security Engineering, Vol. 8, No. 3, Jun. 2011.
|
7 |
J. S. Park, E. K, Cho, and S. G. Kang, "Security Technology for World Wide Web", ETRI Electronics and Telecommunications Trends, Vol. 11 No. 4, Dec. 1996.
|
8 |
G. B. Cho, "A Survey of Information Security Technology in the Ubiquitous Environments", Samsung SDS Consulting Review, No. 3, 2005.
|
9 |
Michael, C., Developer's Guide To Web Application Security, Syngress, 2007.
|
10 |
Shreeraj, S., Web 2.0 Security: Defending Ajax, RIA, and SOA, Thomson, 2007.
|