주민등록번호 대체수단에 대한 구현 취약점 분석
Vol. 17, No. 2, pp. 145-185,
4월.
2007
10.13089/JKIISC.2007.17.2.145, Full Text:
Keywords: I-PIN, Security analysis, Network Security
Abstract Statistics
Cite this article
10.13089/JKIISC.2007.17.2.145, Full Text:
Keywords: I-PIN, Security analysis, Network Security
Abstract Statistics
Cite this article
[IEEE Style]
Y. Choi, Y. Lee, S. Kim, D. Won, "Security Analysis on the Implementation Vulnerabilities of I-PIN," Journal of The Korea Institute of Information Security and Cryptology, vol. 17, no. 2, pp. 145-185, 2007. DOI: 10.13089/JKIISC.2007.17.2.145.
[ACM Style]
Youn-Sung Choi, Yun-Ho Lee, Seung-Joo Kim, and Dong-Ho Won. 2007. Security Analysis on the Implementation Vulnerabilities of I-PIN. Journal of The Korea Institute of Information Security and Cryptology, 17, 2, (2007), 145-185. DOI: 10.13089/JKIISC.2007.17.2.145.