ǥ
1.()
2.ڸ( )
3.Ҽӱ
4.κо
5. Ű
(ʿ ѱ Ű α)
6.ּ
7.ó ȭ :
:
FAX :
E-mail :
* Ʈũ Ʈ ο *
- ( 츸 , ) -
ۡۡ*, ۡۡ**
Study of Mobile Network SecurityComponent Design to Implement
Mobile Electronic Government.
: Subtitle here if needed
θ Ʈpũ Ʈ ϱ ִ.
(1984) (1990) īƮ(1998) ϸ鼭 ڴ(2002)
Ӹ(2003) Ͽ.
Abstract
The purpose of this paper is to design the mobile network
security component to implement mobile electronic government.
Henderson(2002) and Zimmerman(2003) models are newly introduced
comparingmodels of Davis(1984), Porter(1990), and Venkatraman(1998).
Key Words: mobile, network, LBS
.
. ̷
III.
. ȸ Ʈ
V.
.
[1] ȫ浿, " Ÿ̽ ", ȸ,11ȣ,pp.10-15,
2004.
[2] M. K. Johnson and E.W. Troan inux Application Development(2nd
Ed.)", Addison Wesley, 2004.
[3] A. J. Thadhani, "Factors Affecting Programmer Productivity
during Application Development," IBM System Journal,Vol.23,No.1,
pp.19-35, 1984.
[4] W. C. Yen and D. W. Lean, "Data Cherence Problem
in a Multicache System," IEEE Trans. on Soft. Eng.
Vol. SE-34, No.1, pp.56-65, Jan. 1985.