References
- Yoon-Su Jeong, Yong-Tae Kim, "Security Protocol of u-Healthcare User Information based on i-PIN", Korean Institute of Information Technology, The Journal of Korean Institute of Information Technology, Vol.9, No.10, pp.133-141, 2011.
- Yoon-Su Jeong, Sang-Ho Lee, "User Authentication Protocol through Distributed Process for Cloud Environment". Korea Institute of Information Security & Cryptology, Journal of The Korea Institute of Information Security & Cryptology, Vol.22, No.4, pp.841-849, 2012.
- Young Seop Ahn, Jeong Kyung Moon, Yeon-i Kang, Hwang Rae Kim, Koo Rack Park, Dong Hyun Kim, "An User Authentication Protocol for Cloud Computing". Korean Society for Internet Information, Korean Society for Internet Information Academic Annual Conference Proceedings, pp.51-52, 2011.
- Yoon-Su Jeong, Yong-Tae Kim, "Personal Authentication Protocol of IPTV Game User using PIN Code". The Korea Institute of Information and Communication Engineering, Journal of the Korea Institute of Information and Communication Engineering, Vol.15, No.12, pp.2670-2678, 2011. https://doi.org/10.6109/jkiice.2011.15.12.2670
- Kwang-Hee Choi, Jong-Chan Ahn, Gang-Shin Lee, Seung-Ho Ahn, "i-PIN 2.0 Service Framework for Replace RRN on The Internet". Korea Institute of Information Security & Cryptology, Review of KIISC, Vol.20, No.6, pp.88-95, 2010.
- Chan-Joo Chung, Yoon-Jeong Kim, Jin-Won Kim, Kwang-Jin Park, "Technical Standard and Service Framework for Develop The Alternative(i-PIN) of RRN", Korea Institute of Information Security & Cryptology, Review of KIISC, Vol.18, No.6, pp. 20-27, 2008.
- Jung-Dong Kim, Kwan-Tae Cho, Dong-Hoon Lee, "A Study of Online User Identification Based on One-Time Password with Guaranteeing Unlinkability", Korea Institute of Information Security & Cryptology, Journal of The Korea Institute of Information Security & Cryptology, Vol.21, No.5, pp.129-139, 2011.
- Seung-Hyun Kim, Seok-Hyun Kim, Seung-Hun Jin, A Study on an Alternation of RNN and Access Control for Offline Environments by using I-PIN, Korea Information Processing Society, Vol.18, No.1, 2011.
- Java Card Technology, http://www.oracle.com/technetwork/java/javacard/overview/index.html
- KISA, http://www.signgate.com
- Chan-Joo Chung, Seung-Joo Kim, Dong-Ho Won, "A Study on The On-line Identification Plan by Using Financial Security OTP", Korea Institute of Information Security & Cryptology, Review of KIISC, Vol.18, No.5, pp.73-83, 2008.
- Seung-Hyun Kim, Seok-Hyun Kim, Seung-Hun Jin, "A Study on an Alternation of RNN and Access Control for Offline Environments by using I-PIN", Korea Information Processing Society, Korea Information Processing Society Conference, pp. 840-843, 2011.
- Hyung-Hyo Lee, "An Alternative Resident Registration Number System and Management Framework for Privacy Protection", Korean Institute of Information Technology, The Journal of Korean Institute of Information Technology, Vol.8, No.6, pp.49-58, 2010.
- Hyung-Hyo Lee, Hee-Man Park, Sang-Rae Cho, Seung-Hun Jin, "The Suggestion for A New On/Off-line Personal Identification Number System Offering The Privacy Safeguards", Korea Institute of Information Security & Cryptology, Review of KIISC, Vol.20, No.1, pp.74-87, 2010.
- In-Yong Jang, Heung-Youl Youm, "A Study on Activation Plan of i-PIN for Identification on The Internet", Korea Institute of Information Security & Cryptology, Review of KIISC, Vol.19, No.5, pp. 81-94, 2009.