1 M.H, Kwang, "VPN(Virtual Private Ntwork) Technology Overview" korea institute of information security and cryptology 1-, 1999
2 D. M. Lim, "Trends of Information Communications industry" 55-, 2005
3 "Telecommunications Business Act Article 47 (2)"
4 "Smishing"
5 "Ministry of Science, ICT and Future Planning, Starting Secure Payment Group for Smishing avoidance"
6 "ENFORCEMENT DECREE OF THE TELECOMMUNICATIONS BUSINESS ACT Article 30(Exemption from Notification of Value-Added Service Operator)"
7 "ENFORCEMENT DECREE OF THE Act on Internet Address Resources Article 11-2"
8 KrCert, "Damage case as a passage after Virtual Private Network(VPN) setting)"
9 DIGITALTIMES, "Chinese Hacker use Domestic IP Adderess as hacking passage"
10 "Arresting a credit card or Smart Phone Froud suspector"
1 M.H, Kwang, "VPN(Virtual Private Ntwork) Technology Overview" korea institute of information security and cryptology 1-, 1999
2 D. M. Lim, "Trends of Information Communications industry" 55-, 2005
3 "Telecommunications Business Act Article 47 (2)"
4 "Smishing"
5 "Ministry of Science, ICT and Future Planning, Starting Secure Payment Group for Smishing avoidance"
6 "ENFORCEMENT DECREE OF THE TELECOMMUNICATIONS BUSINESS ACT Article 30(Exemption from Notification of Value-Added Service Operator)"
7 "ENFORCEMENT DECREE OF THE Act on Internet Address Resources Article 11-2"
8 KrCert, "Damage case as a passage after Virtual Private Network(VPN) setting)"
9 DIGITALTIMES, "Chinese Hacker use Domestic IP Adderess as hacking passage"
10 "Arresting a credit card or Smart Phone Froud suspector"
11 "Act on Internet Address Resources Article 14(Agency management of Internet addresses)"
12 J.H.Choi, "A Study on Countermeasure against Voicde Phishing using VPN" 8 (8): 191-, 2009