참고문헌
- Security Standards Council, 'Payment Card Industry (PCI) Data Security Standard', http://www.pcisecuritystandards.org/, Sep. 2006
- Office of the Comptroller of the Currency (OCC), http://www.occ.treas.gov/netbank/netbank.htm, 'Electronic Banking Guidance'
- Federal Financial Institutions Examination Council, http://www.ffiec.gov, 'FIEC Guidance on Electronic Financial Services and Consumer Compliance'
- Federal Trade Commission, http://www.ftc. gov/
- 금융보안연구원 보안 기술팀, '전자금융 사고현황 및 방지대책(안)' , 2007. 03
- George Tubin, 'The Sky is Falling:The Need for Stronger Consumer Online Banking Authentication', Market Research Report, TowerGroup, Apr 2005
- Richard E. Smith, 'Authentication:From Passwords to Public Keys', Addison Wesley, 2002
- Candid W., 'Phishing In The Middle of the stream'-Today's Threats to Online Banking', Symantec Security Response, 2006
- Christian Ludl, Sean McAllister, Engin Kirda, and Christopher Kruegel, 'On the Effectiveness of Techniques to Detect Phishing Sites', LNCS 4579, Springer, 2007
- Rolf Oppliger, and Sebastian Gajek, 'Effective Protection Against Phishing and Web Spoofing', LNCS 3677, Springer, 2005
- State Services Commission, 'Guidance on Multifactor Authentication', http://www.e.govt.nz, 2006
- Hole, J, K. J., and Moen. V, 'Case Study:Online Banking Security', IEEE Security & Privacy, 2006
- Hiltgen, A, Kramp, T. and Weigold, T., 'Secure Internet Banking Authentication' , IEEE Security & Privacy, 2006
- Committee on National Security Systems(CNSS) Instruction No. 4009, National Information Assurance (IA) Glossary, published by the United States Federal Government, Revised June, 2006
- Roshen Chandran, 'Partial Passwords and Keystroke Loggers', http://plynt.com/blog/2005/08/partial-passwords-and-keystrok/, 2005
- Forrester Research, 'ForrTel:Online Banking Customer Authentication:Review of Two-Factor Authentication Mechanisms In Use Today', 2005
- Oppliger R. Gajek S., 'Effective protection against phishing and web spoofing' ,9th IFIP TC-11 Conference, 2005
- Plosni K., Federrath H., Nowey T., 'Protection Mechanisms Against Phishing Attacks', LNCS 3592, Springer, 2005
- Tieyan Li, and Wu Yongdong, 'Trust on Web Browser:Attack vs. Defense', International Conference on Applied Cryptography and Network Security (ACNS'03), 2003
- Amir Herzberg, and Ahmad Jbara, 'Security and Identification Indicators for Browsers against Spoofing and Phshing attacks', Cryptology ePrint Archive, 2006
- Markham, G. 'Phishing-Browser-based Defences', http://www.gerv.net/security/phishing-browser-defences. html, 2005
- Rachna Dhamija, 'The battle against phishing:Dynamic Security Skins', '05:Proceedings of the 2005 symposium on Usable privacy and security (SOUPS), 2005
- 금융감독원, http://www.fss.or.kr
- 최동현, 김승주, 원동호, '일회용 패스워드(OTP:One-Time Password) 기술 분석및 표준화 동향', 정보보호학회 논문지 17권 제 3호, 2007. 06
- ComputerWorld Security, 'Another new Trojan intercepts online banking information' http://www.computerworld.com/action/article.do?command= viewArticleBasic&articleId=9057240
- Candid W., 'Threats to Online Banking', Symantec Security Response, 2005
- URL, 'Security Technologies:Authentication parts', www.isg.rhul.ac.uk/files/IY5522_2006-07_Lec_07.pdf.,
- Beker, Henry J., Halliden, Paul W., Friend, and John M. K., 'US Patent 4890323-Data communication systems and methods', http://www. freepatentsonline.com/4890323.html
- 김기영, '일회용 패스워드를 기반으로 한 인증시스템에 대한 고찰', 정보보호학회논문지 제17권 3호, 2007. 06
- RSA, 'RSA, Fighting Emerging Threats:How to Compat Man-In-The-Middle And Trojan Attacks', 2007
- Verisign, 'A Guide to Providing Proactive Protection to Consumer Online Transactions', Whitepaper, 2008
- George Tubin, 'Emergence of Risk-Based Authentication in Online Financial Services;You Can't Hide Your Lyin' IPs', TowerGroup Industry Report, May 2005
- United States federal law, 'The Fair and Accurate Credit Transactions Act', 2003
- David M'Raihi, Sharon Boeyen, Michael Grandcolas, and Siddharth Bajaj, 'How to Share Transaction Fraud (Thraud) Report Data', IETF Internet draft(in progress), http://www.ietf.org/internetdrafts/draft-mraihi-inch-thraud-04.txt, Feb. 2008
- Actimize, http://www.actimize.com/
- Cyota, http://www.rsa.com/
- 41st, http://the41stparameter.com
- Fair Isacs, http://www.fairisaac.com
- Quova, http://www.quova.com/
- Iovation, http://www.iovation.com/
- Entrust, http://www.entrust.com/
- Digital Resolv, http://www.digitalenvoy.net/