최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기The International journal of advanced culture technology, v.2 no.1, 2014년, pp.25 - 29
Jung, Yong Gyu (Department of Medical IT Marketing, Eulji University) , Kang, Min Soo (Department of Medical IT Marketing, Eulji University) , Jung, Ga-Woon (Scientific Research Group, Neulpureun High School) , Cha, Kwang Seung (CIO) , Chong, Agatha (Trulogic)
China and South Korea have effectively reached a free trade agreement. The deal now faces legal and parliament reviews in the two countries. We need to discuss the recommendations on XML conversion with UN / CEFACT electronic documents. To solve this problem of interworking between these standards, ...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Adams, C., & Lloyd, S. (1999). Understanding public-key infrastructure: concepts, standards, and deployment considerations. Sams Publishing.
Bruggink, D., Karsten, P., & de Meijer, C. R. (2012). The European cards environment and ISO 20022. Journal of Payments Strategy & Systems, 6(1), 80-99.
Ferris, J. M. (2012). The ISO PIA Standard for Financial Services. In Privacy Impact Assessment (pp. 307-321). Springer Netherlands.
Hartsink, G. (2014). Standardisation: A conditio sine qua non for efficient payment services. Journal of Payments Strategy & Systems, 8(1), 23-29.
Hartsink, G. (2014). Standardisation: A conditio sine qua non for efficient payment services. Journal of Payments Strategy & Systems, 8(1), 23-29.
Janssens, P. (2014). The implications of legal entity identifiers on payments systems. Journal of Payments Strategy & Systems, 8(2), 147-156.
Preneel, B. (1993, January). Standardization of cryptographic techniques. In Computer Security and Industrial Cryptography (pp. 162-173). Springer Berlin Heidelberg.
Sassone, V. (2014). ETAPS Award Laudatio for Kohei Honda. Bulletin of EATCS, 1(112).
Stapleton, J. J. (2014). Security Without Obscurity: A Guide to Confidentiality, Authentication, and Integrity. CRC Press
Yong-Gyu Jung, Dong-Won Lee, Seung-Bum Ahn (2002), Electronic Payment and Exchange Security Service under m-Logistics Environments, Proceeding of Korea Institute of Information Science, Vol. 29, No. 2, pp55-57
Yong-Gyu Jung (2004), EDI Security Algorithm on UN/EDIFACT Messages, Proceeding of Korea Institute of Information Science, Vol. 31, No. 1, pp217-219N.
Un-Seob, Yong-Gyu Jung (2008), XML mapping for UN/CEFACT standard electronic messages, Proceeding of 2008 Cross-Cultural Conference of Current Business Issues, Academy of Global Business Network, pp65-74
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.