1 |
S.-S. Yeo, D. I. Park, and Y. A. Jung, "Enhanced ID-based Authentication Scheme using OTP in Smart Grid AMI Environment," Journal of Applied Mathematics, Hindawi, 2014 (to appear)./
|
|
2 |
J. Ha, K.-D. Park, J. Won, and M.-B. Heo, "Co-seismic deformation and strain in South Korea following the 2011 Tohoku-oki earthquake from GPS measurements", Journal of Civil Engineering, vol. 18, vo. 5, July 2014, printed./
|
|
3 |
ByungRae Cha and JongWon Kim, "Security Tactics for Secured Cloud Computing Resources," ICOIN 2013, Jan. 30 2013./
|
|
4 |
Hong, Duan, and Luo Yang. "A Gestures Trajectory Recognition Method Based on DTW", Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering, 2013./
|
|
5 |
InSun Kim (2013. April). Crame caught the tail SNS. Etnews [Online]. Available: http://www.etnews.com/
|
|
6 |
JeHun Choi (2013. April). Boston Marathon Terror Suspect Arrest. SeoulNewspaper [Online]. Available: http://www.seoul.com/
|
|
7 |
J. Song et al, "Ambiguity Level Adjustment Among Networks of Compact Network RTK for Land Vehicle Users", ION 2013 Pacific PNT Meeting, Honolulu, Hawaii, pp.138-145, April 2013./
|
|
8 |
H. W. Kim and D. K. Kim, "IoT Technology and Security," Review of KIISC, Vol. 22, No. 1, pp.1- 13, February 2013./
|
|
9 |
Airports Council International, "Global Traffic Forecast 2012-2031", 2013./
|
|
10 |
Ministry of Land, Infrastructure and Transport, "Aviation Law Regulations", Jul.2013/
|
|