References
- 최대선, 진승헌, "모바일 ID 보안 및 프라이버시를 위한 스마트 지갑", 정보과학회지, 27(12), pp.50-59, 2009년.
- W. Diffie and M.E. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
- B.A. Forouzan, Cryptography and network security, 1th Ed., McGraw-Hill, 2008.
- N. Saxena and M. Uddin, "Secure pairing of 'Interface-Constrained' devices resistant against rushing user behavior", Applied Cryptography and Network Security, pp. 34-52, June 2009.
- A. Perrig and D. Song, "Hash visualization: A new technique to improve real-world security", Cryptographic Techniques and E-Commerce, pp. 131-138, 1999.
- I. Goldberg. "Visual key fingerprint Code", 1996.
- J.M. McCune, A. Perrig, and M.K. Reiter, "Seeing-is-Believing: Using camera phones for human-verifiable authentication", IEEE Symposium on Security and Privacy, pp. 110-124, May 2005.
- N. Saxena, "Secure device paring based on a visual channel", IEEE Symposium on Security and Privacy, pp. 306-313, May 2006.
- S. Laur, N. Asokan and K. Nyberg, "Efficient mutual data authentication using manually authentication strings", Cryptography and Network Security, pp. 90-107, Dec 2006.
- M.T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. "Loud and clear: Human-verifiable authentication based on audio", IEEE International Conference on Distributed Computing Systems, July 2006.
- C. Soriente, G. Tsudik, and E. Uzun, "BEDA: Button-enabled device association", International Workshop on Security for Spontaneous Interaction, Sep. 2007.
- C. Soriente, G. Tsudik, and E. Uzun, "HAPADEP: Human-assisted pure audio device pairing", International Security Conference, pp. 385-400, Sep. 2008.
- A. Kumar, N. Saxena, G. Tsudik, and E. Uzun, "Caveat emptor: A comparative study of secure device pairing methods", IEEE International Conference on Pervasive Computing and Communications, pp. 1-10, May 2009.
- R. Kainda, I. Flechais, and A.W. Roscoe, "Usability and security of out-of-band channels in secure device pairing protocols", Symposium On Usable Privacy and Security, July 2009.
- R. Mayrhofer and H. Gellersen, "Shake well before use: Intutive and secure pairing of mobile devices", IEEE Transaction on Mobile Computing, pp. 792-806, 2009. https://doi.org/10.1109/TMC.2009.51
- R.L. Rivest and A. Shamir, "How to expose an eavesdropper", Communications of ACM, vol. 27, no. 4, pp. 393-394, April 1984 https://doi.org/10.1145/358027.358053