{"id":390,"date":"2016-02-07T12:56:31","date_gmt":"2016-02-07T03:56:31","guid":{"rendered":"http:\/\/pel.sejong.ac.kr\/wordpress\/?p=390"},"modified":"2016-02-07T12:56:31","modified_gmt":"2016-02-07T03:56:31","slug":"%eb%89%b4%ec%a7%88%eb%9e%9c%eb%93%9c-university-of-canterbury-%ec%9d%98-%ea%b9%80%eb%8f%99%ec%84%b1-%ea%b5%90%ec%88%98-%ec%84%b8%eb%af%b8%eb%82%98","status":"publish","type":"post","link":"https:\/\/pel.sejong.ac.kr\/wordpress\/?p=390","title":{"rendered":"\ub274\uc9c8\ub79c\ub4dc University of Canterbury \uc758 \uae40\ub3d9\uc131 \uad50\uc218 \uc138\ubbf8\ub098"},"content":{"rendered":"<p>\ub274\uc9c8\ub79c\ub4dc University of Canterbury \uc758 \uae40\ub3d9\uc131 \uad50\uc218\ub97c \ubaa8\uc2dc\uace0 2\uc6d4 2\uc77c\uc5d0 \uc138\ubbf8\ub098\ub97c \uc9c4\ud589 \ud588\uc2b5\ub2c8\ub2e4. \uc138\ubbf8\ub098 \uc8fc\uc81c\ub294\u00a0Graphical Security Models and Their Applications \ub85c\uc368, \uc8fc\uc5b4\uc9c4 \uc2dc\uc2a4\ud15c\uc744 \ubcf4\uc548 \uad00\uc810\uc5d0\uc11c \ubaa8\ub378\ub9c1\ud558\uace0 \ud3c9\uac00\ud558\ub294 \ubc29\uc548\uc744 \uadf8\ub798\ud504 \uc774\ub860\uc744 \uc774\uc6a9\ud574 \ud574\uacb0\ud558\uace0\uc790 \ud558\ub294 \uc5f0\uad6c\ub0b4\uc6a9\uc744 \ubc1c\ud45c \ud558\uc600\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uae40\ub3d9\uc131 \uad50\uc218 \ud648\ud398\uc774\uc9c0:\u00a0<a href=\"http:\/\/www.cosc.canterbury.ac.nz\/dongseong.kim\/\" target=\"_blank\">http:\/\/www.cosc.canterbury.ac.nz\/dongseong.kim\/<\/a><\/p>\n<p><a href=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2016\/02\/12642496_10208541733004608_7590099681186661303_n.jpg\" rel=\"attachment wp-att-391\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-391\" src=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2016\/02\/12642496_10208541733004608_7590099681186661303_n-595x793.jpg\" alt=\"12642496_10208541733004608_7590099681186661303_n\" width=\"595\" height=\"793\" srcset=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2016\/02\/12642496_10208541733004608_7590099681186661303_n-595x793.jpg 595w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2016\/02\/12642496_10208541733004608_7590099681186661303_n-480x640.jpg 480w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2016\/02\/12642496_10208541733004608_7590099681186661303_n-225x300.jpg 225w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2016\/02\/12642496_10208541733004608_7590099681186661303_n.jpg 720w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ub274\uc9c8\ub79c\ub4dc University of Canterbury \uc758 \uae40\ub3d9\uc131 \uad50\uc218\ub97c \ubaa8\uc2dc\uace0 2\uc6d4 2\uc77c\uc5d0 \uc138\ubbf8\ub098\ub97c \uc9c4\ud589 \ud588\uc2b5\ub2c8\ub2e4. \uc138\ubbf8\ub098 \uc8fc\uc81c\ub294\u00a0Graphical Security Models and Their Applications \ub85c\uc368, \uc8fc\uc5b4\uc9c4 \uc2dc\uc2a4\ud15c\uc744 \ubcf4\uc548 \uad00\uc810\uc5d0\uc11c \ubaa8\ub378\ub9c1\ud558\uace0 \ud3c9\uac00\ud558\ub294 \ubc29\uc548\uc744 \uadf8\ub798\ud504 \uc774\ub860\uc744 \uc774\uc6a9\ud574 \ud574\uacb0\ud558\uace0\uc790 \ud558\ub294 \uc5f0\uad6c\ub0b4\uc6a9\uc744 \ubc1c\ud45c \ud558\uc600\uc2b5\ub2c8\ub2e4. \uae40\ub3d9\uc131 \uad50\uc218 \ud648\ud398\uc774\uc9c0:\u00a0http:\/\/www.cosc.canterbury.ac.nz\/dongseong.kim\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/390"}],"collection":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=390"}],"version-history":[{"count":1,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/390\/revisions"}],"predecessor-version":[{"id":392,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/390\/revisions\/392"}],"wp:attachment":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}