logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 19(16): 2385-2403
https://doi.org/10.3217/jucs-019-16-2385 (01 Oct 2013)
Other versions:
XML
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CitationCitation
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 19(16): 2385-2403
doi: 10.3217/jucs-019-16-2385
Received: 15 Jul 2013 | Approved: 27 Sep 2013 | Published: 01 Oct 2013
This article is part of:
JUCS - Journal of Universal Computer Science 19(16): Information Security
Authors
Youngho Park - Corresponding author
Pukyong National University, Busan, Republic of Korea
Articles by this author in:  CrossRef  |  Google Scholar
Chul Sur
Pukyong National University, Busan, Republic of Korea
Articles by this author in:  CrossRef  |  Google Scholar
Sanguk Shin
Pukyong National University, Busan, Republic of Korea
Articles by this author in:  CrossRef  |  Google Scholar
Kyung-Hyune Rhee
Pukyong National University, Busan, Republic of Korea
Articles by this author in:  CrossRef  |  Google Scholar
Changho Seo
Kongju National University, Chungcheongnam-Do, Republic of Korea
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK