전자금융거래에서의 문서변조 취약점 분석 및 대응방법 고찰

The Korea Institute of Information Security and Cryptology, Vol. 20, No. 6, pp. 17-27, 12월. 2010
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. Maeng, D. Shin, S. Kim, D. Nyang, "nan," The Korea Institute of Information Security and Cryptology, vol. 20, no. 6, pp. 17-27, 2010.

[ACM Style]
Young-Jae Maeng, Dong-Oh Shin, Sung-Ho Kim, and Dae-Hun Nyang. 2010. nan. The Korea Institute of Information Security and Cryptology, 20, 6, (2010), 17-27.