최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기산업융합연구 = Journal of industrial convergence, v.21 no.5, 2023년, pp.133 - 142
In recent years, the problem of academic credential falsification is not simply the manipulation of certificates generated by educational institutions, but also the difficulty of trusting automated relationship verification and verification itself, such as falsely recording completion as graduation ...
Statistics Korea. (2022). Number of Universities:?Number of Universities by Region, Retrieved?from https://kosis.kr/
KEDI. (2022). National University Department?Status, Retrieved from https://www.kess.kedi.re.kr/
Korea Ministry of Government Legislation.?(2021). criminal law. Article 225 (Forgery or?Alteration of Public Documents, etc.), Retrieved?from https://www.law.go.kr/
Choi, Y. L. (2022). "Forgery of public and?private documents is rampant in employment,?admission, and promotion"? Arrest of 90?people, Retrieved from https://www.hani.co.kr/
Lee, J. H. (2022). Doctor sentenced to prison for?forgery of private documents... "Illegal Disposition of License Cancellation", Retrieved?from https://www.doctorsnews.co.kr/
Korea Ministry of Government Legislation.?(2021). criminal law. Article 231 (Forgery or?Alteration of Private Documents, etc.), Retrieved from https://www.law.go.kr/
CWUR. World University Rankings 2022-23,?Retrieved from https://cwur.org/
SPRING. (2022). Spring Framework, Retrieved?from https://spring.io/
Choi, J. W., Koh, S. J. (2022). Enhancement of?e-Government Standard Framework for Cloud?Transformation in Public Sector Information?System. Proceedings of Symposium of the?Korean Institute of communications and?Information Sciences, 606-608.
Alaca, F., & Oorschot, P. C. V. (2020).?Comparative analysis and framework evaluating?web single sign-on systems. ACM Computing?Surveys (CSUR), 53(5), 1-34.
Alwazzeh, M., Karaman, S., & Shamma, M. N.?(2020). Man in The Middle Attacks Against?SSL/TLS: Mitigation and Defeat. Journal of?Cyber Security and Mobility, 449-468.
R. L. Rivest, A. Shamir, and L. Adleman. 1978. A method for obtaining digital signatures and?public-key cryptosystems. Commun. ACM 21, 2?(Feb. 1978), 120-126.?DOI : 10.1145/359340.359342
Heron, S. (2009). Advanced encryption standard?(AES). Network Security, 2009(12), 8-12.
Van Ginkel, N., De Groef, W., Massacci, F., &?Piessens, F. (2019). A server-side JavaScript security?architecture for secure integration of thirdparty libraries. Security and Communication?Networks, 2019.
Ministry of Interior And Safety - Data Portal.?(2022). Ministry of Education, Major Status by?Department by University nationwide, Retrieved?from https://www.data.go.kr/
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.