참고문헌
- Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, "Applied Cryptography," CRC Press, 1997.
- 금융감독원, "영국의 인터넷뱅킹 관련 사기 피해 증가," 금융감독정보, 통권 396호, pp.43-44, Nov., 2006.
- Wikipedia, the free encyclopedia(http://en.wikipedia.org/wiki/ PINpad).
- TTA(Telecommunications Technology Association), "Standard of Contact Type IC Card Terminal," Telecommunications Technology Association, 2003.
- C.Y. Han, H.W. Jang, "An Empirical Study on the Use of POS System for Inventory Efficiency," Journal of Korean Industrial Information Systems Society, Vol.10, No.1, pp.81-88, 2005.
- Jablon, P.D. "Strong password-only authenticated key exchange," ACM SIGCOMM Computer Communication Review, (26:5), pp.5-20, 1996. https://doi.org/10.1145/242896.242897
- Halevi, S. and Krawczyk, H. "Public-key cryptography and password protocols," ACM Conference on Computer and Communications Security, pp.122-131, 1998. https://doi.org/10.1145/288090.288118
- Bellovin, M.S. and Merrit, M. "Augmented encrypted key exchange: Password-based protocol secure against dictionary attack and password file compromise," Proceedings of the 1st ACM Conference on Computer and Communications Security, pp.244-250, 1993. https://doi.org/10.1145/168588.168618
- Halevi, S. and Krawczyk, H. "Public-key cryptography and password protocols," ACM Conference on Computer and Communications Security, pp.122-131, 1998. https://doi.org/10.1145/288090.288118
- Li, Zhi., Sun, Qibin., Lian, Yong., Giusto, D.D., "An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack," 2005 IEEE International Conference on Multimedia and Expo(ICME-05), pp.245-248, 2005. https://doi.org/10.1109/ICME.2005.1521406
- Lei, M., Xiao, Y., Vrbsky, S.V., "Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing," Computer communications, Vol.31, No.18, pp.4367-4375, 2008. https://doi.org/10.1016/j.comcom.2008.05.005
- Park, S.B., Kang, M.S. and Lee, S.J. "Authenticated key exchange protocol secure against off-line dictionary attack and server compromise," Lecture Notes in Computer Science, Vol.3032, pp.924-931, 2004.
- Park, S.B., Kang, M.S. and Lee, S.J. "New authentication system," Lecture Notes in Computer Science, Vol.3032, pp.1095-1098, 2004.
- Park, S.B., Kang, M.S. and Lee, S.J. "User authentication protocol based on human memorable password and using ECC," Lecture Notes in Computer Science, Vol.3032, pp.1091-1094, 2004. https://doi.org/10.1007/978-3-540-24679-4_188
- 소리나무미디어, "일회용 비밀번호 생성 및 해석 방법," 대한민국 특허청, 2007. 01.
- Nebojsa Jojic and Paul Roberts, "image based password systems," http://research.microsoft.com/en-us/um/people/ darkok/projectssyscli.htm.
- D. Kirovski, N. Jojic, and P. Roberts. "Click Passwords," 21st IFIP International Information Security Conference, pp. 351-363, 2006. https://doi.org/10.1007/0-387-33406-8_30
- RealUser, "Passfaces: Two Factor Authentication, Graphical Password," http://www.realuser.com/index.htm.
- Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd, "Reducing Shoulder-surfing by Using Gaze-based Password Entry," Proceedings of the 3rd symposium on Usable Privacy and Security(SOUPS 2007), pp.13-19, 2007. https://doi.org/10.1145/1280680.1280683
- Nemeth, Garth Snyder, and Trent R. Hein, "Linux Administration Handbook(2nd Edition)," Prentice Hall PTR, 2006.
- Edward K. Vogel & Maro G. Machizawa, "Neural activity predicts individual differences in visual working memory capacity," Nature, Vol.428, pp.748-151, 15 April, 2004. https://doi.org/10.1038/nature02447
- S.B. Park, M.S. kang, Secure Password System against Imposter, The KIPS Transactions : Part C, Vol.10-C, No.2, pp.141-144, 2003. https://doi.org/10.3745/KIPSTC.2003.10C.2.141
- S.B, Park, N.K. Joo, M.S. Kang, Practically Secure and Efficient Random Bit Generator Using Digital Fingerprint Image for the Source of Random, The KIPS Transactions: Part D, Vol.10-D, No.3, pp.541-146, 2003. https://doi.org/10.3745/KIPSTD.2003.10D.3.541
- (주)비원플러스, 리듬패스 & 참아이디, http://www.beone.co.kr/.
피인용 문헌
- Advanced Password Input Method in Automated Teller Machines/Cash Dispenser vol.18C, pp.2, 2011, https://doi.org/10.3745/KIPSTC.2011.18C.2.071