References
- KCS.KO-12.0054, "Service model and functional capabilities of the internet-Personal Identification Number Service", Sep, 2012
- "Recommendation ITU-T X.1252, Baseline identity management terms and definitions", April, 2010
- KCS.KO-12.0054, "Service model and functional capabilities of the internet-Personal Identification Number Service", Sep, 2012
- Soniya B. Milmile, Amol k. Boke, "Review Paper on real time password authentication system for ATM," IJAICT Volume 1, Issue 7, November 2014
- NIST Announces the Release of Special Publication (SP) 800-63-2, Electronic Authentication Guideline September 4, 2013
- OMB Memorandum M-04-04, E-Authentication Guidance for Federal agencies, December 16, 2003.
- ITU-T X.1254 , Entity authentication assurance framework, September, 2012.
- ISO/IEC 29115, Information technology -- Security techniques -- Entity authentication assurance framework, 2013.
- KCS.KO-12.0170, Connecting Information for internet-Personal Identification Number Service, 2012
- KCS.KO-12.0038, Duplicated Joining Verification Information for internet-Personal Identification Number Service, 2012
- KISA i-PIN, http://i-pin.kisa.or.kr/kor/main.jsp
- Ministry of the Interior government personal identification number, http://www.g-pin.go.kr/
- The Kyunghyang Shinmun, "750,000 illegal issuance of I-pin.... government apologies in 8 days," http://news.khan.co.kr/kh_news/khan_art_view.html?artid=201503100907371&code=940100, 2015.3.10.
- MOPAS, "Countermeasures to prevent Illegal issuance of I-pin", http://www.korea.kr/policy/pressReleaseView.do?newsId=156042425&call_from=extlink 2015.3.25.
- ISO/IEC CD 29003, Information technology -- Security techniques -- Identity proofing, 2016.4.
- Recommendation ITU-T X.1250 (2009), Baseline capabilities for enhanced global identity management and interoperability, September, 2009.
- Wikipedia, Keystroke logging, https://en.wikipedia.org/wiki/Keystroke_logging
- Whatis.com, social engineering, http://searchsecurity.techtarget.com/definition/social-engineering
- Cisco Phishing Overview, http://www.cisco.com/c/en/us/products/security/email-security-appliance/phishing_index.html
- Wikipedia, Man-in-the-middle attack, https://en.wikipedia.org/wiki/Man-in-the-middle_attack
- Juniper, IP Spoof Attack Prevention Overview, https://www.juniper.net/techpubs/en_US/idp5.0/topics/concept/intrusion-detection-prevention-ipspoof-attack-prevention-overview.html
- ISO/IEC JTC 1/SC 27/WG 5 N235, Call for contributions to SC 27/WG 5 Study Period on entity authentication assurance framework (EAAF), 2015-11-12
- H.Y. YOUM, "need to change Online idetity verification system," DigitalTimes, http://www.dt.co.kr/contents.html?article_no=2015101302102251607002, 2015.10.
- Abbie Barbie, Heung Youl Youm, Proposal of NWI: X.1254rev Entity authentication assurance framework, ITU-T SG17 TD-2568 (Rev.1), 2016.03
- MOPAS, Alternative research on Social Security Number Usage by sector, SCH IACF, 2012.12.
- K.H, PARK, "A study of the scenario for improvement of NPKI system" Vol.8, No.4, pp.59-71, Dec 2010
- H.N. ZOO, "Data Protection and Privacy over the Internet: Towards Development of an International Standard", Vol.11, No.4, pp.57-69, Apr,2013
- B.H. KIM, "Analysis of Standard Security Technology for Security of the Network", Vol.13, No.12, pp.193-202, Dec 2015 https://doi.org/10.14400/JDC.2015.13.12.193
- S.B. KIM, "A study on the Efficient e-Commerce Policies under the Smart Phone Environment", Vol.10, No.1, pp.125-133, Feb 2012 https://doi.org/10.14400/JDPM.2012.10.1.125
- Y.S, Choo, "Design The User Authentication Frame work Using u-helath System", Vol.13, No.5, pp.219-226, May 2015
- Keun-Ho Lee, "Analysis of Threats Factor in IT Convergence Security", Journal of the Korea Convergence Society, Vol. 1, No. 1, pp. 49-55, 2010.
- Jun-Young Go, Keun-Ho Lee, "SNS disclosure of personal information in M2M environment threats and countermeasures", Journal of the Korea Convergence Society, Vol. 5, No. 1, pp. 29-34, 2014. https://doi.org/10.15207/JKCS.2014.5.1.029