참고문헌
- Dale Vile, Freeform Dynamic, “User convenience versus system security”, 2006.
- Roger Elrod, “Two-factor Authentication”, East Carolina University, 2005, July.
- [Definition] Wikipedia, Definition of Two Factor Authentication.
- Smart Card Alliance (Randy Vanderhoof), “Smart Card Technology Roadmap for secure ID applications”, 2003.
- Tim Hastings, Multi-factor Authentication and the Cloud, 2010.
- Korea Internet Security Agency, Introduction of i-PIN (http://i-pin.kisa.or.kr), 2010.
- Accredited Certificate: http://www.rootca.or.kr
- Public Procurement Service: http://www.g2b.go.kr
- Public Procurement Service(PPS), Bidder Identification and Fingerprint Registration Process, 2010, April.
- OMB M-04-04, E-Authentication Guidance for Federal agencies, 2003, December, 16.
- NIST, Special Publication 800-63, Electronic Authentication Guideline, 2006, April.
- Ministry of Citizens’ Services, Electronic Credential and Authentication Standard, 2010, April.
- Bret Hartman, “From Identity Management to Authentication: Technology Evolution to Meet Cyber Threats”, ITAA IdentEvent 2008.
- Fidelity National Information Services, Multi -Factor Authentication Risk Assessment, 2006.
- OWASP foundation, OWASP Testing Guide, 2008 v3.0, pp.140-143.
- IETF RFC 4683, Internet X.509 Public Key Infrastructure Subject Identification Method (SIM), 2006.10.
피인용 문헌
- Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition vol.76, pp.5, 2017, https://doi.org/10.1007/s11042-016-3350-1
- Go anywhere: user-verifiable authentication over distance-free channel for mobile devices vol.17, pp.5, 2013, https://doi.org/10.1007/s00779-012-0531-4
- UFLE: a user-friendly location-free encryption system for mobile users 2012, https://doi.org/10.1002/sec.615
- Game-based image semantic CAPTCHA on handset devices vol.74, pp.14, 2015, https://doi.org/10.1007/s11042-013-1666-7
- Unified threat model for analyzing and evaluating software threats 2014, https://doi.org/10.1002/sec.599