1 |
W.-Y. Jeong and S.-K. Lee, "A Study on the Self-Key Generation Algorithm for Security Elevation in Near Field Communications," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 5, 2012, pp. 1027-1032.
과학기술학회마을
|
2 |
C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of The Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-803.
과학기술학회마을
|
3 |
S.-J. Park and J.-H. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, 2014, pp. 261-266.
과학기술학회마을
DOI
|
4 |
S. Liu, L. Lazos, and M. Krunz, "Thwarting Inside Jamming Attacks on Wireless Broadcast Communications," In Proc. of the Fourth ACM Conf. on Wireless Network Security WiSec'11, Hambourg, Germany, June 2011, pp. 29-40.
|
5 |
S.-R. Cho and K.-J. Choi, "Design and Implementation of the OMA DM Client on the Open Mobile Terminal Platform," In Proc. the Institute of Electronics and Information Engineers, Seoul, Korea, Nov. 2006, pp. 188-191.
|
6 |
T. Kim, "OMA Standardization - OMA Device management," TTA J., vol. 97, Feb. 2005, pp. 114-119.
|