Search > Reference Search
Search Result
학술지
No Reference Title /Author/Journal Title Citing Article
1 Xiangye Xiao, Qiong Luo, Dan Hong, Hongbo Fu, Xing Xie, Wei-Ying Ma, "Browsing on small displays by transforming Web pages into hierarchically structured subpages," ACM Transactions on the Web, pp. 4-36, 2029./ View Article
2 S.-H. Kim, "A Fast Algorithm for Computing the Shortest Path between Two Points inside a Segment-Visible Polygon," Journal of KIMICS, Vol. 14, No. 2, 2010. (in Korean)/ View Article
3 Ju-Won Lee, Byeong-Ro Lee, "Heart Rate Estimation Based on PPG signal and Histogram Filter for Mobile Healthcare", Int. Journal of KIMICS, Vol.8 no. 1, pp. 112-115, 2010./   KOI   DOI View Article
4 Y. S. Yu, S. H. Choi, H.-K. Park, C. Lee, Y.-S. Jeong, and S.-H. Kim, "A power-, delay- and emergency-efficient protocol of ubiquitous sensor network systems for silver town applications", J. Supercompt., 2010 (DOI: 10.1007/s11227-009-0320-7)./   DOI View Article
5 Barney Beal, "Salesforce.com, customers hit with phishing attack," in SearchCRM.com, [Online] Nov 2007, [2010 May 29] Available: http://searchcrm.techtarget.com/news/1281107/Salesforce-com-customers-hit-with-phishing-attack/ View Article
6 Daniele Catteddu and Giles Hogben, "Cloud computing: benefits, risks and recommendations for information security," in European Network and Information Security Agency (ENISA) 2009 Report, [Online] Nov 2009, [2010 May 27] Available: http://www.enisa.europa.eu// View Article
7 M. R. Pamidi, "Cloud Computing: A Status Report," in IT Newsletter of IT Newswire, [Online] Dec 2009, [2010 May 27] Available: http://www.itnewswire.us/Newsletter_December-28-2009.pdf/ View Article
8 Ali Al-Qayedi, Wael Adi, Ahmed Zahro, and Ali Mabrouk "Combined Web/Mobile Authentication for Secure Web Access Control" in Proceedings of Wireless Communications and Networking Conference, 2004 [2010 May 29] Available: http://ieeexplore.ieee.org/stampPDF/getPDF.jsp?tp=&arnumber=1311267/ View Article
9 Min Wu,Simson Garfinked, and Rob Mille, "Secure Web Authentication with Mobile Phones," in DIMACS Workshop on Usable Privacy and Security Software, 2004, [2010 May 29] Available: http://dimacs.rutgers.edu/Workshops/Tools/abstract-wu-garfinkel-miller.pdf/ View Article
10 Cloud Security Alliance, "Top Threats to Cloud Computing V1.0," in Cloud Security Alliance Report, [Online] Mar 2010, [2010 May 27] Available: http://www.cloudsecurityalliance.org/topthreats.html/ View Article