참고문헌
- 문순환, 김신홍, 노광현, "홍채 정보 기반 마우스를 활용한 사용자 인증 시스템," 한국콘텐츠학회논문지, 제6권, 제1호, pp.144-151, 2006.
- 김재성, 이성재, 김병섭, 이상우, "텔레바이오인식 기반 비대면 인증기술 표준화 동향," 정보보호학회지, 제25권, 제4호, pp.43-50, 2014.
- 최필수, 박상선, 김동구, "모바일 지급결제 및 바이오 인식 융합기술 동향," 정보보호학회지, 제22권, 제4호, pp.21-28, 2012.
- Biometrics: Technologies and Global Markets, BCC Research, 2016.
- 문기영, "생체인식 기술현황 및 전망. 한국전자통신연구원 정보보호연구단 special report.
- R. Hopkins, "An Introduction to Biometrics and Large Scale Civilian Identification," International Review of Law Computer and Technology, Vol.13, No.3, pp.337-363, 1999. https://doi.org/10.1080/13600869955017
- A. Jain, L. Hong, and S. Pankanti, "Biometric Identification," Communications of the ACM, Vol.43, No.2, pp.91-98, 2000.
- L. Coventry, A. De Angeli, and G. Johnson, "Usability and Biometric Verification at the ATM Interface," SIGCHI conference on Human factors in computing systems, pp.153-160, 2003.
- 김재성, "모바일 바이오인식 신융합기술 및 표준화 동향," KISA Report, pp.54-78, 2013(3).
- 이범근, 고속 홍채 인식 시스템에 관한 연구, 경희대학교 대학원, 박사학위논문, 2011.
- 조소라, 남기표, 정대식, 신광용, 박강령, 신재호, "장파장 근적외선 조명 및 밴드 패스 필터 기반이동형 홍채 인식 시스템 및 성능 평가," 멀티미디어학회 논문지, 제14권, 제9호, pp.1125-1137, 2011.
- 장영균, 강병준, 박강령, "손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구," 정보처리학회논문지 B, 제15-B권, 제4호, pp.275-284, 2008.
- Yanagawa, Takashi, Satoshi Aoki, and Tetsuji Ohyama, "Human finger vein images are diverse and its patterns are useful for personal identification," MHF Prepr, Ser 12, pp.1-7, 2007.
- T. James, T. Pirim, K. Boswell, B. Reithel, and R. Barkhi, "Determining the intention to use biometric devices: an application and extension of the technology acceptance model," Journal of Organizational and End User Computing, Vol.18, No.3, pp.1-24, 2006. https://doi.org/10.4018/joeuc.2006070101
- C. Morosan, "Theoretical and empirical considerations of guests' perceptions of biometric systems in hotels: extending the technology acceptance model," Journal of Hospitality and Tourism Research, Vol.36, No.1, pp.52-84, 2012a. https://doi.org/10.1177/1096348010380601
- C. Morosan, "Biometric solutions for today's travel security problems," Journal of Hospitality and Tourism Technology, Vol.3, No.3, pp.176-195, 2012b. https://doi.org/10.1108/17579881211264477
- C. Morosan, "Understanding the antecedents of perceived value of registered traveler biometric systems," Journal of Hospitality Marketing and Management, Vol.21, No.8, pp.872-896, 2012c. https://doi.org/10.1080/19368623.2012.631728
- C. Morosan, "Voluntary steps toward air travel security: an examination of travelers' attitudes and intentions to use biometric systems," Journal of Travel Research, Vol.51, No.4, pp.436-450, 2012d. https://doi.org/10.1177/0047287511418368
- J. Kim, K. P. Brewer, and B. Bernhard, "Hotel customer perceptions of biometric door locks: convenience and security factors," Journal of Hospitality and Leisure Marketing, Vol.17, No.1, pp.162-183, 2008. https://doi.org/10.1080/10507050801978323
- C. Morosan, "Customer's Adoption of Biometric Systems in Restaurants: An Extension of the Technology Acceptance Model," Journal of Hospitality Marketing & Management, Vol.20, No.6, 2011.
- J. Kim, K. P. Brewer, and B. Bernhard, "Hotel customer perceptions of biometric door locks: convenience and security factors," Journal of Hospitality and Leisure Marketing, Vol.17, No.1, pp.162-183, 2008. https://doi.org/10.1080/10507050801978323
- Thomas Hill, Nancy D. Smith, and Millard F. Mann, "Role of Efficacy Expectations in Predicting the Decision to Use Advanced Technologies: The Case of Computers," Journal of Applied Psychology, Vol.72, No.2, pp.307-313, 1987. https://doi.org/10.1037/0021-9010.72.2.307
- M. Igbaria and J. Iivari, "The Effects of Self-efficacy on Computer Usage," Omega International Journal of Science, Vol.23, No.6, pp.587-605, 1995. https://doi.org/10.1016/0305-0483(95)00035-6
- Simon Liu and Mark Silverman, "A Practical Guide to Biometric Security Technology," IT Pro by IEEE, pp.27-32, 2001.
- 조병철, 박종만, "다중 생체인식 기반의 인증기술과 과제," 한국통신학회논문지, 제40권, 제1호, pp.132-141, 2015. https://doi.org/10.7840/kics.2015.40.1.132
- B. M. Vatanasombut, A. C. Igbaria, and W. Stylianou, Information Systems Continuance Intention of Web-based applications customers: the case of online banking, 2008.
- H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke, "Information Privacy: Measuring Individuals' Concerns about Organizational Practices," MIS Quarterly, Vol.20, No.2, pp.167-196, 1996. https://doi.org/10.2307/249477
- Jones, Laurie A., Annie I. Anton, and Julia B. Earp, Towards understanding user perceptions of authentication technologies, Proceedings of the 2007 ACM workshop on Privacy in electronic society, ACM, 2007.
- Juan Carlos Roca, Chao-Min Chiu, and Francisco Jose Martinez, "Understanding e-learning continuance intention: An extension of the Technology Acceptance Model," International Journal of human-computer studies, Vol.64, No.8, pp.683-696, 2006. https://doi.org/10.1016/j.ijhcs.2006.01.003
- 조제경, 서종원, 이형우, "안전한 스트리밍 서비스를 위한 지문인식기반 인증시스템," 한국콘텐츠학회논문지, 제4권, 제2호, pp.246-249, 2006.