모바일보안을 위한 MDM의 효과적인 접근 방법
The Korea Institute of Information Security and Cryptology,
Vol. 23, No. 2, pp. 29-34,
Apr.
2013
Full Text:
Statistics
Cite this article
Full Text:
![](https://d2kjln74dkk4oj.cloudfront.net/img/pdficon_small.png)
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
K. H. Lee and D. S. Yoon, "nan," The Korea Institute of Information Security and Cryptology, vol. 23, no. 2, pp. 29-34, 2013.
[ACM Style]
Kang Hyun Lee and Doo Shik Yoon. 2013. nan. The Korea Institute of Information Security and Cryptology, 23, 2, (2013), 29-34.