237 | -- | 241 | Stefanos Gritzalis, Justin Z. Zhan, Kitae Jeong. IT convergence and security |
243 | -- | 256 | Keunwoo Rhee, Dongho Won, Sang-Woon Jang, Sooyoung Chae, Sangwoo Park. Threat modeling of a mobile device management system for secure smart work |
257 | -- | 272 | Ai Thao Nguyen Thi, Tran Khanh Dang. Enhanced security in internet voting protocol using blind signature and dynamic ballots |
273 | -- | 289 | Zan Yang, Jianxin Wang, Lin Yang, Rui-guang Yang, Bao-sheng Kou, Jie-kun Chen, Shu-Mei Yang. The RBAC model and implementation architecture in multi-domain environment |
291 | -- | 315 | Jae Hun Jang, Sam Won Kim, Yangsun Lee, Jongsung Kim. The effects of relationship benefit on relationship quality and store loyalty from convergence environments - NPS analysis and moderating effects |
317 | -- | 328 | Hangbae Chang. The security service rating design for IT convergence services |
329 | -- | 345 | Fei Shi, Weijie Liu, Dongxu Jin, JooSeok Song. A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology |
347 | -- | 356 | Sung-Min Jung, Tae-Kyung Kim, Hee Suk Seo, Seung Jae Lee, Jin Kwak. The prediction of network efficiency in the smart grid |
357 | -- | 377 | Young-Sik Jeong, Tae-Kyu Yeom, Ji Soo Park, Jong Hyuk Park. Efficient model of Korean graphemes based on a smartphone keyboard |
379 | -- | 398 | Kyung-Soo Lim, Changhoon Lee. A framework for unified digital evidence management in security convergence |
399 | -- | 410 | Hai-Cheng Chu, Chi-Hsiang Lo, Han-Chieh Chao. The disclosure of an Android smartphone's digital footprint respecting the Instant Messaging utilizing Skype and MSN |