1 |
Xiangye Xiao, Qiong Luo, Dan Hong, Hongbo Fu, Xing Xie, Wei-Ying Ma, "Browsing on small displays by transforming Web pages into hierarchically structured subpages," ACM Transactions on the Web, pp. 4-36, 2029./
|
|
2 |
S.-H. Kim, "A Fast Algorithm for Computing the Shortest Path between Two Points inside a Segment-Visible Polygon," Journal of KIMICS, Vol. 14, No. 2, 2010. (in Korean)/
|
|
3 |
Ju-Won Lee, Byeong-Ro Lee, "Heart Rate Estimation Based on PPG signal and Histogram Filter for Mobile Healthcare", Int. Journal of KIMICS, Vol.8 no. 1, pp. 112-115, 2010./
|
|
4 |
Y. S. Yu, S. H. Choi, H.-K. Park, C. Lee, Y.-S. Jeong, and S.-H. Kim, "A power-, delay- and emergency-efficient protocol of ubiquitous sensor network systems for silver town applications", J. Supercompt., 2010 (DOI: 10.1007/s11227-009-0320-7)./
|
|
5 |
Barney Beal, "Salesforce.com, customers hit with phishing attack," in SearchCRM.com, [Online] Nov 2007, [2010 May 29] Available: http://searchcrm.techtarget.com/news/1281107/Salesforce-com-customers-hit-with-phishing-attack/
|
|
6 |
Daniele Catteddu and Giles Hogben, "Cloud computing: benefits, risks and recommendations for information security," in European Network and Information Security Agency (ENISA) 2009 Report, [Online] Nov 2009, [2010 May 27] Available: http://www.enisa.europa.eu//
|
|
7 |
M. R. Pamidi, "Cloud Computing: A Status Report," in IT Newsletter of IT Newswire, [Online] Dec 2009, [2010 May 27] Available: http://www.itnewswire.us/Newsletter_December-28-2009.pdf/
|
|
8 |
Ali Al-Qayedi, Wael Adi, Ahmed Zahro, and Ali Mabrouk "Combined Web/Mobile Authentication for Secure Web Access Control" in Proceedings of Wireless Communications and Networking Conference, 2004 [2010 May 29] Available: http://ieeexplore.ieee.org/stampPDF/getPDF.jsp?tp=&arnumber=1311267/
|
|
9 |
Min Wu,Simson Garfinked, and Rob Mille, "Secure Web Authentication with Mobile Phones," in DIMACS Workshop on Usable Privacy and Security Software, 2004, [2010 May 29] Available: http://dimacs.rutgers.edu/Workshops/Tools/abstract-wu-garfinkel-miller.pdf/
|
|
10 |
Cloud Security Alliance, "Top Threats to Cloud Computing V1.0," in Cloud Security Alliance Report, [Online] Mar 2010, [2010 May 27] Available: http://www.cloudsecurityalliance.org/topthreats.html/
|
|