ConferenceCitationThe 11th International Conference on Information Security and Cryptology, ICISC 2008, pp.166 - 183PublisherLecture Notes in Computer SciencePlaceKO
ConferenceCitationThe 3rd International Joint Workshop on Information Security and Applications (IJWISA 2008)PublisherDivision of BK21 Informaion Security in Ubiquitous EnvironmentPlaceKO