Research on Access Control and Encryption Transmission of 6LoWPAN
Vol.10 No.12 (2016.12)
pp.1-12
A Novel Technique for Detection & Isolation of Blackhole Attack
Vol.10 No.12 (2016.12)
pp.13-20
Design and Implementation of Inter-core Communication of Embedded Multiprocessor Based on Shared Memory
Vol.10 No.12 (2016.12)
pp.21-30
Real-time Evaluation Mechanism Based on Double Evidence Classification of User Behavior
Vol.10 No.12 (2016.12)
pp.31-42
이용수 : 7회
A Secure and Efficient Vehicle-to-Vehicle Communication Scheme using Bloom Filter in VANETs
Vol.8 No.2 (2014.03)
pp.9-24
이용수 : 6회
A Review and Comparative Analysis of Various Encryption Algorithms
Vol.9 No.4 (2015.04)
pp.289-306
이용수 : 4회
User Resistance of Mobile Banking in China: Focus on Perceived Risk
Vol.8 No.2 (2014.03)
pp.167-172
이용수 : 4회
Does Darker Hide More Knowledge? The Relationship between Machiavellianism and Knowledge Hiding
Vol.10 No.11 (2016.11)
pp.281-292