
{"id":366,"date":"2010-02-01T09:00:10","date_gmt":"2010-02-01T00:00:10","guid":{"rendered":"http:\/\/itrc.pusan.ac.kr\/?p=366"},"modified":"2025-01-28T19:45:40","modified_gmt":"2025-01-28T10:45:40","slug":"%ec%9d%b4%eb%8f%99%ea%b1%b4-%ec%9d%b4%ec%b2%a0%ed%9d%ac-%ec%b5%9c%eb%91%90%ed%98%b8-%ea%b9%80%ec%b2%a0%ec%88%98-%ec%b5%9c%ec%9d%80%ec%98%81-%ea%b9%80%ed%98%b8%ec%9b%90eta-t-pairing","status":"publish","type":"post","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/366\/","title":{"rendered":"\uc774\ub3d9\uac74, \uc774\ucca0\ud76c, \ucd5c\ub450\ud638, \uae40\ucca0\uc218, \ucd5c\uc740\uc601, \uae40\ud638\uc6d0,\u201cEta-T Pairing \uc54c\uace0\ub9ac\uc998\uc758 \ud6a8\uc728\uc801\uc778 \ud558\ub4dc\uc6e8\uc5b4 \uad6c\ud604\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c, \uc815\ubcf4\ubcf4\ud638\ud559\ud68c\ub17c\ubb38\uc9c0, ISSN 1598-3986, Vol. 20, No. 1, pp. 3~16, 2010. 2"},"content":{"rendered":"<div style=\"position:absolute;left:-50000000px;\">\n<span style=\"color: #ffffff; \"><a href=\"https:\/\/www.semiaccurate.com\/\">bento4d<\/a><\/span><br \/>\n<span style=\"color: #ffffff; \"><a href=\"https:\/\/www.hb-hautsdefrance.com\/\">situs toto<\/a><\/span><br \/>\n<span style=\"color: #ffffff; \"><a href=\"https:\/\/mbam.org.my\/\">toto slot<\/a><\/span><br \/>\n<span style=\"color: #ffffff; \"><a href=\"https:\/\/savetheduckusa.com\/\">data pengeluaran hk<\/a><\/span><br \/>\n<span style=\"color: #ffffff; \"><a href=\"https:\/\/tm-i.ch\/\">bento4d<\/a><\/span><br \/>\n<span style=\"color: #ffffff; \"><a href=\"https:\/\/snowmassmammothfest.com\/\">rtp<\/a><\/span><br \/>\n<span style=\"color: #ffffff; \"><a href=\"https:\/\/www.fafich.ufmg.br\/\">bento4d<\/a><\/span>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>bento4d situs toto toto slot data pengeluaran hk bento4d rtp bento4d<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,22,10],"tags":[],"class_list":["post-366","post","type-post","status-publish","format-standard","hentry","category-paper","category-domestic-journal","category-publication"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=366"}],"version-history":[{"count":2,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/366\/revisions"}],"predecessor-version":[{"id":9219,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/366\/revisions\/9219"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/categories?post=366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/tags?post=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}