참고문헌
- M. Stamp, Information Security: Principles and Practice 2nd Edition, Wiley-Inerscience, 2011.
- Tepandi, "Wireless PKI Security and Mobile Voting", IEEE Computer, Vol. 43, No. 6, pp. 54-60, 2010.
- S. H. Yun, "The Biometric based Mobile ID and Its Application to Electronic Voting", KSII Transactions on Internet and Information Systems, Vol. 7, No. 1, pp. 166-183, 2013. https://doi.org/10.3837/tiis.2013.01.011
- P. Janbandhu, M. Siyal, "Novel biometric digital signatures for Internet-based applications", Information Management & Computer Security, Vol. 9, No. 5, pp. 205-212, 2001. https://doi.org/10.1108/09685220110408022
- N. K. Ratha, J. H. Connell, R. M. Bolle, "Enhancing security and privacy in biometric-based authentication systems", IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001. https://doi.org/10.1147/sj.403.0614
- ITU-T X.1088, A Framework for biometric digital key generation, ITU-T, 2008.
- Apple Support, Ues Touch ID on iPhone and iPad, http://support.apple.com/kb/HT5883.
- C. Vivaracho-Pascual, J. Pascual-Gaspar, "On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services", IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 1-10, 2011.
- H. Li, K. Toh, L. Li, Advanced Topics in Biometrics, World Scientific, 2011.
- L. Harn, "(t,n) Threshold Signature and Digital Multisignature", Workshop on Cryptography & Data Security, pp. 61-73, 1993.
- S. H. Yun, "The USIM based Biometric Multi-Signature for Mobile Content Authentication", ICONI, pp. 137-141, 2011.
- W. Diffie, M. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, 1976. https://doi.org/10.1109/TIT.1976.1055638
- D. M. Burton, Elementary Number Theory, McGraw-Hill, 2010.
- T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985. https://doi.org/10.1109/TIT.1985.1057074
- D. Chaum, "Undeniable Signatures", Advances in Cryptology, Proceedings of CRYPTO'89, Springer-Verlag, pp. 212-216, 1990.
- D. R. Kim, "A Study on the OTP Generation Algorithm for User Authentication", Journal of Digital Convergence, Vol. 13, No. 1, pp. 283-288, 2015. https://doi.org/10.14400/JDC.2015.13.1.283
- Y. J. Song, S. M. Gu, Y. C. Kim, "A Study on the Distributed Transcoding System using Secret Sharing Techniques", Journal of Digital Convergence, Vol. 12, No. 11, pp. 233-239, 2014. https://doi.org/10.14400/JDC.2014.12.11.233
- S. H. Hong, "Vulnerability of Directory List and Countermeasures", Journal of Digital Convergence, Vol. 12, No. 10, pp. 259-264, 2014. https://doi.org/10.14400/JDC.2014.12.10.259
- H. M. Choi, C. B. Jang, J. M. Kim, "Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM", Journal of Digital Convergence, Vol. 12, No. 10, pp. 299-308, 2014.
- S. Y. Lee, S. S. Yeo, "Efficient Secret Sharing Data Management Scheme for Privacy Protection in Smart Grid Environment", Journal of Digital Convergence, Vol. 11, No. 12, pp. 311-318, 2013. https://doi.org/10.14400/JDPM.2013.11.12.311
피인용 문헌
- User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System vol.93, pp.1, 2017, https://doi.org/10.1007/s11277-016-3595-z
- A Scheme for User Authentication using Pupil vol.14, pp.9, 2016, https://doi.org/10.14400/JDC.2016.14.9.325