References
- E. J. Choi, W. C. Jung, S. Y. Kim,"Attacks and Defenses for Vulnerability of Cross Site Scripting," Journal of digital Convergence, Vol. 13, No. 2, pp. 177-183, 2015. https://doi.org/10.14400/JDC.2015.13.2.177
- H. J. Mun, G.H, Choi, Y.C. Hwang, "Countermeasure to Underlying Security Threats in IoT communication," Journal of IT Convergence Society for SMB, Vol. 6, No. 2, pp. 37-44, 2016.
- S. H. Hong, "XSS Attack and Countermeasure: Survey," Journal of digital Convergence, Vol. 11, No. 7, pp. 327-332, 2013.
- K. H. Choi, K. Y. Chung, D. K. Shin, "A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information", Journal of digital Convergence, Vol. 11, No. 3, pp. 273-277, 2016. https://doi.org/10.14400/JDPM.2013.11.3.273
- B. S. Yu, S. H. Yun, "The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing," Journal of the Korea Convergence Society, Vol. 2, No. 4, pp. 9-14, 2011.
- S. H. Hong,"Cognitive Approach to Anti-Phishing and Anti-Pharming : Survey", Journal of IT Convergence Society for SMB, Vol. 3, No. 2, pp. 33-39, 2013.
- S. D. Yoo, J.G. Kim, "How to improve carrier (telecommunications) billing services to prevent damage", Journal of digital Convergence, Vol. 11, No. 10, pp. 217-224, 2013. https://doi.org/10.14400/JDPM.2013.11.10.217
- J. H. Kim, J. Y. Go, K. H. Lee, "A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing," Journal of the Korea Convergence Society, Vol. 6. No. 1, pp. 85-91, 2015. https://doi.org/10.15207/JKCS.2015.6.1.085
- H. J. Seo, H. W. Kim, "Secure Keypad with Encrypted Input Message," Journal of the Korea Institute of Information and Communication Engineering, Vol. 18, No. 12, pp. 2899-2910, 2014. https://doi.org/10.6109/jkiice.2014.18.12.2899
- S. Y. Jun, I. J Jeong, "LTE Spectrum Policy: Focused on the OECD 12 Countries," Journal of digital Convergence, Vol. 12, No. 8, pp. 1-18, 2014. https://doi.org/10.14400/JDC.2014.12.8.1
- J. S. Han, "Security Threats in the Mobile Cloud Service Environment," Journal of digital Convergence, Vol. 12, No. 5, pp. 263-269, 2014. https://doi.org/10.14400/JDC.2014.12.5.263
- D. R. Kim, K. H. Han, "A Study on Multi-Media Contents Security using Smart Phone," Journal of digital Convergence, Vol. 11, No. 11, pp. 675-682, 2013. https://doi.org/10.14400/JDPM.2013.11.11.675
- S. W. Choi, Y. J. Shin, "Economy Effects of IT Industry on Financial and Insurance Services", Journal of digital Convergence, Vol. 13, No. 1, pp. 191-203, 2015. https://doi.org/10.14400/JDC.2015.13.1.191
- D. R. Kim, "A Study on the OTP Generation Algorithm for User Authentication," Journal of the Korea Convergence Society, Vol. 13, No. 1, pp. 283-288, 2015.
- S. H. Hong, "New Authentication Methods based on Users Behavior Big Data Analysis on Cloud," Journal of IT Convergence Society for SMB, Vol. 6, No. 4, pp. 31-36, 2016.
- H. J. Moon, M. H. Lee, K. H. Jeong, "Authentication Performance Optimization for Smart-phone based Multimodal Biometrics," Journal of digital Convergence, Vol. 13, No. 6, pp. 151-156, 2015. https://doi.org/10.14400/JDC.2015.13.6.151
- C. Shuang, S. J. Lee, K. R. Lee, "A Study on Chinese User Resistance of Mobile Banking," Journal of digital Convergence, Vol. 12, No. 1, pp. 105-111, 2014. https://doi.org/10.14400/JDPM.2014.12.1.105
- D. R. Kim, "Secure One-Time Password Authentication in Mobile Environments," Journal of digital Convergence, Vol. 11, No. 12, pp. 423-430, 2013. https://doi.org/10.14400/JDPM.2013.11.12.423
- S. H. Lee, D. W. Lee, "FinTech-Conversions of Finance Industry based on ICT," Journal of the Korea Convergence Society, Vol. 6, No. 3, pp. 97-102, 2015. https://doi.org/10.15207/JKCS.2015.6.3.097
- J. M. Ryu, Y. M. Seo, H. J. Cho, "A Study on Business Model of Fintech - Focus on the Business model canvas-," Journal of digital Convergence, Vol. 14, No. 3, pp. 171-179, 2016. https://doi.org/10.14400/JDC.2016.14.3.171
- Y. M. Kang, Y. G. Lee, H. J. Kwon, K. S. Han, H. S. Chung, "A Study on the Information Security System of Fin-Tech Business," Journal of IT Convergence Society for SMB, Vol. 6, No. 2, pp. 19-24, 2016. https://doi.org/10.22156/CS4SMB.2016.6.2.019
- Q. Yue, Z. Ling, X. Fu, B. Liu, W. Yu, and W. Zhao, "My google glass sees your passwords!." Proceedings of the Black Hat USA, 2014.
- H.J. Seo, H. W. Kim, "Design of Security Keypad Against Key Stroke Inference Attack," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 1, pp. 41-47, 2016. https://doi.org/10.13089/JKIISC.2016.26.1.41
- S. H. Kim, M. S. Park, S. J. Kim, "Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes," Journal of the Korea Institute of Information Security & Cryptology, Vol. 24, No. 6, pp. 1159-1174, 2014. https://doi.org/10.13089/JKIISC.2014.24.6.1159
- Y. H. Lee, "An Analysis on the Vulnerability of Secure Keypads for Mobile Devices," Journal of Korean Society for Internet Information, Vol. 14, No. 3, pp. 15-21, 2013.
- D.H. Lee, D.H. Bae, S.L. Yoo, J. Y. Chae, Y.H. Lee, H.G. Yang, "Analysis of safety in secure keypads for smartphone," REVIEW OF KIISC, Vol. 21, No. 7, pp. 30-37, 2011.
- W.G. Pak, S.K Yeo, Y.R. Cha, "A Secure Virtual Keypad for Mobile devices," Proceeding of KOREA INFORMATION SCIENCE SOCIETY, pp. 875-876, 2015.
- H. J. Kim, H. J. Seo, Y. C. Lee, T. H. Park, H.W. Kim, "Implementation of virtual finace keypads with resistance for shoulder surfing attack," REVIEW OF KIISC, Vol. 23, No. 6, pp. 21-29, 2013.