키 생명주기에 따른 단계별 안전성 요구사항 분석

The Korea Institute of Information Security and Cryptology, Vol. 13, No. 5, pp. 48-69, Oct. 2003
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Han, K. An, J. Kwak, H. Yang, D. Won, "nan," The Korea Institute of Information Security and Cryptology, vol. 13, no. 5, pp. 48-69, 2003.

[ACM Style]
Jong-Soo Han, Ki-Bum An, Jin Kwak, Hyung-Kyu Yang, and Dong-Ho Won. 2003. nan. The Korea Institute of Information Security and Cryptology, 13, 5, (2003), 48-69.