역추적 기술 및 보안 요구사항 분석

The Korea Institute of Information Security and Cryptology, Vol. 18, No. 5, pp. 132-141, Oct. 2008
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Han, R. Kim, J. Ryou, H. Youm, "nan," The Korea Institute of Information Security and Cryptology, vol. 18, no. 5, pp. 132-141, 2008.

[ACM Style]
Jung-Hwa Han, Rach-Hyun Kim, Jae-Cheol Ryou, and Heung-Youl Youm. 2008. nan. The Korea Institute of Information Security and Cryptology, 18, 5, (2008), 132-141.