1 |
E. Y. Chang and S. B. Yoon, "A study on the operating management method of capstone design and graduation portfolio using with the small drone or smartphone," JPEE, vol. 8, no. 1, pp. 1-7, June 2016.
|
2 |
G. Fleishman, "How-To LastPass was hacked: Here's what you have to do," https://www.macworld.com/article/2936663/, June 17, 2015.
|
3 |
J. Y. Woo and E. J. Kim, "Application of Web using Ajax and PHP," Proceeding of KIISE Symposium 2008, vol. 2, no. 1, pp. 91-95, 2008.
|
4 |
S. S. Hyeon and K. O. Kim, "OTP standardization trends at home and abroad," KIISC Review, vol. 22, no. 2, pp. 30-36, 2012.
|
5 |
J. S. Kim, M. S. Kweon, and H. J. Kim, "A study on the Security System using USN/RFID Module," in Proceedings of KIIT Summer Conference, pp. 820-825, 2009.
|
6 |
K. B. Kang, J. S. Park, and E. Y. Chang, "Multi ID service with user security," Proceedings of KIIT Summer Conference, pp. 261-263, June 2017.
|