보안도구에 대한 우회공격 기법 분류 및 분석

The Korea Institute of Information Security and Cryptology, Vol. 13, No. 2, pp. 92-105, 4월. 2003
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
손태식, 서정우, 구원본, 민동옥, 문종섭, 박현미, 이병권, "nan," The Korea Institute of Information Security and Cryptology, vol. 13, no. 2, pp. 92-105, 2003.

[ACM Style]
손태식, 서정우, 구원본, 민동옥, 문종섭, 박현미, and 이병권. 2003. nan. The Korea Institute of Information Security and Cryptology, 13, 2, (2003), 92-105.