1 |
Seun-Gi Mun 3others "M2M communication for building secure mutual authentication and key exchange protocol", Journal of Cryptology, Volume 20, No. 1, pp. 73-83, 2010.
|
2 |
Min-Yeong Ju, "The Twitter account hacking, spamming hundreds of diet", Blotter, 2010.
|
3 |
Cyber Police, http://www.police.go.kr.
|
4 |
Information and Communication Network Utilization and Information Protection Act Amendment, Information and Communication, 2006.
|
5 |
Dong-Hee Kim, Eun-Jae Yu, Gyeong-Sik Min "Online social network environment, security threats and implications", Information Security Issue Report, 2008.
|
6 |
Gyu-Won Jang, Hyeon-Seok Yun. "Privacy in cyberspace". Information Society Policy Research Forum Article 22, Issue 3 Forum. 2011.
|
7 |
Hee-Yeon Kim, Ju-Hyeon Oh. "Status and social implications of domestic SNS". Information and Communications Policy Studies No. 12, No. 24, 2012.
|
8 |
Keun-Ho Lee, "M2M (Machine to Machine) communication of threat analysis" Korea Academic Society 2010 Spring Conference eye Writings Part 1.
|