ȸ ȯմϴ.
 
 
회원가입 아이디·패스워드 찾기
 
 
         /ȸ//

//////
 
ǥ
1.()
2.ڸ( )
3.Ҽӱ
4.κо
5. Ű
(ʿ ѱ Ű α)
6.ּ
7.ó ȭ :
޴ :
FAX :
E-mail :

* Ʈũ Ʈ ο *

- ( 츸 , ) -

ۡۡ*, ۡۡ**


Study of Mobile Network SecurityComponent Design to Implement
Mobile Electronic Government.
: Subtitle here if needed

θ Ʈpũ Ʈ ϱ ִ. (1984) (1990) ׸ īƮ(1998) ϸ鼭 ڴ(2002) Ӹ(2003) Ͽ.

Abstract

The purpose of this paper is to design the mobile network security component to implement mobile electronic government. Henderson(2002) and Zimmerman(2003) models are newly introduced comparingmodels of Davis(1984), Porter(1990), and Venkatraman(1998).
Key Words: mobile, network, LBS


.
. ̷
III.
. ȸ ׽Ʈ
V.
.

[1] ȫ浿, " Ÿ̽ ", ȸ,11ȣ,pp.10-15, 2004.
[2] M. K. Johnson and E.W. Troan inux Application Development(2nd Ed.)", Addison Wesley, 2004.
[3] A. J. Thadhani, "Factors Affecting Programmer Productivity during Application Development," IBM System Journal,Vol.23,No.1, pp.19-35, 1984.
[4] W. C. Yen and D. W. Lean, "Data Cherence Problem in a Multicache System," IEEE Trans. on Soft. Eng. Vol. SE-34, No.1, pp.56-65, Jan. 1985.