Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 김태훈 | * |
dc.date.accessioned | 2017-08-25T02:08:50Z | - |
dc.date.available | 2017-08-25T02:08:50Z | - |
dc.date.issued | 2007 | * |
dc.identifier.isbn | 9783540694281 | * |
dc.identifier.issn | 0302-9743 | * |
dc.identifier.other | OAK-14075 | * |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/235607 | - |
dc.description.sponsorship | Lee Foundation;PREMIA | * |
dc.language | English | * |
dc.title | Induction and implementation of security requirements in each system block | * |
dc.type | Conference Paper | * |
dc.relation.issue | PART 2 | * |
dc.relation.volume | 4352 LNCS | * |
dc.relation.index | SCOPUS | * |
dc.relation.startpage | 694 | * |
dc.relation.lastpage | 701 | * |
dc.relation.journaltitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | * |
dc.identifier.doi | 10.1007/978-3-540-69429-8_76 | * |
dc.identifier.scopusid | 2-s2.0-84886441291 | * |
dc.author.google | Kim T.-H. | * |
dc.author.google | Sakurai K. | * |
dc.author.google | Hwang S.-M. | * |
dc.date.modifydate | 20240322133514 | * |