국내 상용 제품의 인증 취약성 분석

The Korea Institute of Information Security and Cryptology, Vol. 19, No. 4, pp. 53-58, 8월. 2009
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
W. Jeon, D. Won, S. Kim, "nan," The Korea Institute of Information Security and Cryptology, vol. 19, no. 4, pp. 53-58, 2009.

[ACM Style]
Woong-Ryul Jeon, Dong-Ho Won, and Seung-Joo Kim. 2009. nan. The Korea Institute of Information Security and Cryptology, 19, 4, (2009), 53-58.