개인정보보호를 고려한 HCI 기술에 대한 고찰

  • 신수연 (세종대학교 컴퓨터공학과) ;
  • 권태경 (세종대학교 컴퓨터공학부 컴퓨터소프트웨어과)
  • 발행 : 2009.12.15

초록

키워드

참고문헌

  1. G, E, Blonder, 'Graphical passwords', United States Patent 5559961, 1996
  2. S, Brostoff and M, A. Sasse, 'Are Passfaces more usable than passwords: A field trial investigation', In Proceedings of HCI 2000, Springer, pp, 405-424, 2000
  3. J, Goldberg, J, Hagman and V, Sazawal, 'Doodling Our Way to Better Authentication', In Proceedings of Human Factors in Computing Systems (CHI), 2002 https://doi.org/10.1145/506443.506639
  4. P, Golle and D, Wagner, 'Cryptoanalysis of a Cognitive Authentication Scheme (Extended Abstract)', In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp, 66-70, 2007 https://doi.org/10.1109/SP.2007.13
  5. J, P, Hansen, K. Torning, A. S, Johansen, K. Itoh and H, Aoki, 'Gaze Typing Compared with Input by Head and Hand', In Proceedings of Eye Tracking Research & Applications (ETRA) Symposium, ACM, pp, 131-138, 2004 https://doi.org/10.1145/968363.968389
  6. B, Hoanca and K. Mock, 'Screen Oriented Technique for Reducing the Incidence of Shoulder Surfing', In Proceedings of International Conference on Security and Management (SAM), 2005
  7. B, Hoanca and K. Mock, 'Secure Graphical Password System for High Traffic Public Areas', In Proceedings of Eye Tracking Research and Applications (ETRA) Symposium, ACM, pp, 35, 2006 https://doi.org/10.1145/1117309.1117319
  8. D, Hong, S, Man, B, Hawes and M, Mathews, 'A password scheme strongly resistant to spyware', In Proceedings of International Conference on Security and Management, 2002
  9. W, Jansen, 'Authenticating Users on Handheld Devices', In Proceedings of Canadian Information Technology Security Symposium, 2003
  10. W, Jansen, S, Gavrila and V, Korolev, 'A Visual Login Technique for Mobile Devices', In National Institute of Standards and Technology Interagency Report (NISTIR) 7030, 2003
  11. W, Jansen, 'Authenticating Mobile Device User Through Image Selection', In Data Security, 2004
  12. I, Jermyn, A. Mayer, F, Monrose, M, K. Reiter and A. D, Rubin, 'The Design and Analysis of Graphical Passwords', In Proceedings of the 8th USENIX Security Symposium, 1999
  13. M, Kumar, T, Garfinkel, D, Boneh and T, Winograd, 'Reducing Shoulder-surfing by Using Gazebased Password Entry', In Proceedings of Symposium on Usable Privacy and Security (SOUPS), ACM, pp, 13-19, July 2007 https://doi.org/10.1145/1280680.1280683
  14. P, Majaranta and K, J, RaiM, 'Twenty Years of Eye Typing: Systems and Design Issues', In Proceedings of Eye Tracting Research & Application (ETRA) Symposium, ACM, pp, 15-22, 2002 https://doi.org/10.1145/507072.507076
  15. P, Majaranta, I, S, MacKenzie, A. Aula and K. J, Raiha, 'Auditory and Visual Feedback During Eye Typing', In Proceedings of CHI, ACM, pp, 766-767, 2003, http://www.yorku.ca/mack/chi03d,html
  16. P, Majaranta, A. Aula and K. J, RaiM, 'Effects of Feedback on Eye Typing with a Short Dwell Time', In Proceedings of Eye Tracting Research & Application (ETRA) Symposium, ACM, pp, 139-146, 2004 https://doi.org/10.1145/968363.968390
  17. S, Man, D, Hong and M, Mathews, 'A shouldersurfing resistant graphical password scheme', In Proceedings of International Conference on Security and Management (SAM), 2003
  18. D, Nail and J, Thorpe, 'Analyzing User Choice in Graphical Passwords', Technical Report, School of Information Technology and Engineering, University of Ottawa, May 2004
  19. X, Suo, Y, Zhu and G, S, Owen, 'Graphical passwords: A survey', In Proceedings of the 21st An nual Computer Security Applications Conference (ASCSAC'05), 2005 https://doi.org/10.1109/CSAC.2005.27
  20. J. Thorpe and p. C. v. Oorschot, 'Graphical dictionaries and the memorable space of graphical passwords' , In Proceedings of the 13th USENIX security Symposium, 2004
  21. J. Thorpe and p. C. v. Oorschot, 'Towards secure design choices for implementing graphical passwords', In Proceedings of the 20th Annual Computer Security Applications Conference, IEEE, 2004 https://doi.org/10.1109/CSAC.2004.44
  22. J. Thorpe, p. C. van Oorschot and A Somayaji. 'Pass-thoughts: authenticationg with our minds', In Proceedings of New Security Paradigms Workshop, ACM, PP. 45-56, 2005 https://doi.org/10.1145/1146269.1146282
  23. D. Weinshall, 'Cognitive Authentication Schemes Safe Against Spyware (Short Paper)', In Proceedings of IEEE Symposium on Security and Privacy, pp. 295-300, May 2006 https://doi.org/10.1109/SP.2006.10
  24. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy and N. Memon, 'PassPoints: design and longitudinal evaluation of a graphical password system', In International Journal of HumanComputer Studies, 63, pp. 102-127, 2005 https://doi.org/10.1016/j.ijhcs.2005.04.010
  25. S. Wiedenbeck, J. Waters, L. Sobrado and J. C. Birget, 'Design and Evaluation of a ShoulderSurfing Resistant Graphical Password Scheme', In Proceedings of AVI, ACM, pp. 177-184, 2006 https://doi.org/10.1145/1133265.1133303
  26. H. Zhao and X. Li, 'S3PAS: A Scalable ShoulderSurfing Resistant Textual-Grapbical Password Authentication Scheme', In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AlNAW 07), IEEE, pp. 467-472, 2007
  27. Z. Zheng, X. Liu, L. Yin and Z. Liu, 'A Strokebased Textual Password Authentication Scheme', In Proceedings of the 1st International Workshop on Education Technology and Computer Science, IEEE, pp. 90-95, 2009 https://doi.org/10.1109/ETCS.2009.544
  28. The EyeGaze Communication System, 2009 by LC Technologies, Inc., http://www.eyegaze.com
  29. PassFaces: patented technology that uses the brain's natural power to recognize familiar faces, PassFaces corporation, http://www.passfaces.com
  30. MyTobii Communication System, 2008 Tobii Technology AB, http://www.tobii.com