Kyoung Sook Ko

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Currently, most enterprise intranet systems process user information for security and access authentication purposes. However, this information is often captured by unauthorized users who may edit, modify, delete or otherwise corrupt this ∗ corresponding author 420 M. Lee, N.-D. Cho, K.-K. Lee, K.-S. Ko data. In addition, corruption can result from(More)
  • 1