1 |
Kyoung Hee Joung. (2015). An Analysis on the Results of the Operation for Library Remuneration System. JOURNAL OF THE KOREAN SOCIETY FOR LIBRARY AND INFORMATION SCIENCE, 49(4), 265-288.
DOI
|
2 |
Jong-Chul Kim, Young-Seok Kim. (2012). A Study on the Provision of the Copyright Limitations for Libraries of the Korean Copyright Act. Journal of Korean Library and Information Science Society, 43(1), 349-369.
DOI
|
3 |
Jae-Hyun Hong, Kyoung-Hee Joung, Ho-Sin Lee. (2005). A Study on Development of the Copyright Guideline on Reproduction and Transmission in Libraries. Journal of Korean Library and Information Science Society, 36(1), 505-525.
|
4 |
Donghwi Shin, Younsung Choi, Sangjoon Park, Seungjoo Kim, Dongho Won. (2007). Cryptanalysis on the Authentication Mechanism of the NateOn Messenger. Journal of the Korea Institute of Information Security & Cryptology, 17(1), 67-80.
|
5 |
A. Ornaghi and M. Valleri. Man in the middle attacks: demos. In Black Hat USA, 2003.
|
6 |
Callegati, F., Cerroni, W., & Ramilli, M. (2009). Man-in-the-Middle Attack to the HTTPS Protocol. IEEE Security & Privacy, 7(1), 78-81.
|
7 |
SPLViewer, http://www.lvbprint.de/bin/current/SplViewSetup.exe,2018.06.15
|
8 |
Gaw, S., & Felten, E. W. (2006, July). Password management strategies for online accounts. In Proceedings of the second symposium on Usable privacy and security (pp. 44-55).
|
9 |
KISA, https://www.kisa.or.kr/business/violation/violation1_sub4.jsp,2018.06.15
|
10 |
https://www.krcert.or.kr/consult/software/vulnerability.do?orgSiteUrl=https://www.krcert.or.kr, 2018.06.15
|