References
- B.-S. Shim, D.-G. Yoo, "Trends and Activation Plans for Next-generation Wireless Broadband Industry," Journal of Digital Convergence, Vol. 13, No. 12, pp. 13-21, 2015. https://doi.org/10.14400/JDC.2015.13.12.13
- Y.-T. Song, "The Effect of Web-based Communication to Internet Users of Information Characteristics : Focus on Internalization and Conformity," Journal of Digital Convergence, Vol. 14, No. 7, pp. 117-126, 2016. https://doi.org/10.14400/JDC.2016.14.7.117
- S. Yoo, K. Choi, "Consumer protection in e-commerce: the Safety Transaction Service in Korea," Journal of Digital Convergence, Vol. 11, No. 11, pp. 29-36, 2013. https://doi.org/10.14400/JDPM.2013.11.11.29
- S.-B. Kim, "Improvement of IPTV Policy under the Smart Environment," Journal of Digital Convergence, Vol. 11, No. 10, pp. 141-152, 2013. https://doi.org/10.14400/JDPM.2013.11.10.141
- J.-M. Kim, H.-J. Kouh, "Security Analysis of Information Flow using SAT," Journal of Digital Convergence, Vol. 14, No. 6, pp. 253-261, 2016. https://doi.org/10.14400/JDC.2016.14.6.253
- D. Y. Kim, "Trend and Improvement for Privacy Protection of Future Internet," Journal of Digital Convergence, Vol. 14, No. 6, pp. 405-413, 2016. https://doi.org/10.14400/JDC.2016.14.6.405
- H.-W. Choi, M.-C. Ryoo, C.-S. Lee, H. Kim, "Secure Data Gathering Protocol over Wireless Sensor Network," The Journal of Digital Policy & Management, Vol. 11, No. 12, pp. 367-380, 2013.
- L. Lamport, "Password authentication with insecure communication," ACM Communication, Vol. 24, No. 11, pp. 770-772, 1981. https://doi.org/10.1145/358790.358797
- W. S. Juang, "Efficient multi-server password authenticated key agreement using smart cards," IEEE Trans. on Consumer Electronics, Vol. 50, No. 1, pp. 251-255, 2004. https://doi.org/10.1109/TCE.2004.1277870
- D. Mishra, A. K. Das, S. A. Mukhopadhyay, "A secure user anonymity-preserving biometric based multi-server authenticated key agreement scheme using smart cards," Expert Systems with Applications, Vol. 41, No. 18, pp. 8129-8143, 2014. https://doi.org/10.1016/j.eswa.2014.07.004
- K.-C. Shin, "Analysis and security improvements to Mishra et al.'s authentication," Journal of Security Engineering, Vol. 13, No. 4, pp. 261-278, 2016. https://doi.org/10.14257/jse.2016.08.01
- H. Kim, "Remote User Authentication Scheme with Key Agreement Providing Forward Secrecy," Journal of Security Engineering, Vol. 12, No. 1, pp. 1-12, 2015. https://doi.org/10.14257/jse.2015.02.01
- W.S.Choi, D.H.Won, "Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology ," Journal of Internet Computing and Services, Vol. 17, No. 3, pp. 1-10, 2017. https://doi.org/10.7472/JKSII.2016.17.3.01
- Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Junghyun Nam and Dongho Won, "Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography." Sensors, Vol. 14, No. 6, 2014.
- Jongho Moon, Younsung Choi, jaewook Jung, Dongho Won, "An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards." PloS one,Vol 10, No. 12 , 2015.