References
- Garba, A. B., Armarego, J., Murray, D. and Kenworthy, W., "Review of the information security and privacy challenges in BYOD environments," Journal of Information privacy and security, pp. 38-54, 2015.
- S. T. Kang, I. J. Jo, "Individual users based Smart Phone Remote Management System Design and Implementation," The Korea Institute of Information and Communication Engineering, Journal of the Korea Institute of Information and Communication Engineering 16(12), pp.2675-2681, 2012.12. https://doi.org/10.6109/jkiice.2012.16.12.2675
- Onechul Na, Hangbae Chang, "Critical Intelligence Management Plan Studies for the Prevention of Corporation's Technology Leakage," Korean Society For Internet Information, Korean Internet Information Society Conference 17(2), pp.231-232, 2016.11
- S. B. Kim, B. M. Chang, "Design and Implementation of Privacy Impact Assessment Information System", Korean Institute of Information Technology, Journal of Korean Institute of Information Technology 13(6), pp.87-104, 2015.6.
- D. K. Lee, J. I. Lim, "Forecast System for Security Incidents", Journal of The Institute of Electronics and Information Engineers Vol.53, No.6, 2016.6.
- B. J. Jeon, D. B. Yoon, S. S. Shin, "Improved Integrated Monitoring System Design and Construction", Journal of Korea Fusion Research Institute 7(1), pp.25-33, 2017.2
- Y. S. Kim, N. P., "IData Loss Prevention System having a function of Responding Data-Leaking Incidents", THE INSTITUTE OF ELECTRONICS ENGINEERS OF KOREA, Conference on the Institute of Electronics Engineers of Korea, pp.1872-1874, 2012.6.
- S. G. Ryu, Y. H. Park, C. K. Kim, Y. H. Park, "Vulnerability Analysis and Countermeasure of Access Control System", Korean Institute of Communication Sciences, Korea Telecom Society Summer Summit 2016, pp.800-801, 2016.
- B. M. Kim, J. M. Jeong, S. L. Yong, Taenam Cho, "A Password Scheme based on Calculation Resistant to Smudge and Shoulder Surfing Attacks", Korea Computer Information Association, Journal of the Korean Society of Computer Information Vol.22 No.2, pp.75-76, 2014.
- J. W. Kim, Y. H. Lee, "Continuous-authentication Method based on the Risk Profile associated with Context-awareness to Lock Smart Devices", KOREA INFORMATION SCIENCE SOCIETY, Journal of KIISE 43(11) Vol.20, No.8, pp.1259-1269, 2016.11.
- J. P. Yun, J. H. Kim, K. S. Lee, "Certificate-based SSO Protocol Complying with Web Standard", Korea Institute of Information and Communication Engineering, Journal of the Korea Institute of Information and Communication Engineering Vol.20, No.8, pp.1466-1477, 2016.8. https://doi.org/10.6109/jkiice.2016.20.8.1466
- S. H. Seo, C. Y. Choi, G. Y. Lee, H. K. Choi, "QR Code Based Mobile Dual Transmission OTP System", Korean Institute of Communication Sciences, The Journal of the Korean Institute of Communication Sciences Vol.38B No.5, pp.377-384, 2013.5. https://doi.org/10.7840/kics.2013.38B.5.377
- S. K. Hong, H. J. Jeon, Y. H. Kwon and S. H. Lee, "Extracting Information of Client Using Java Agent for Information leakage prevention", Korean Institute of Intelligent Systems, Proceedings of the Korea Intelligent Systems Society, pp.211-212, 2015.10.
- J. Y. Sung, S. D. Lee, C. J. R and S. J. Han, "Mutual Authentication Protocol using One Time Password for Mobile RFID System, Journal of the Korea Institute of Information and Communication Engineering, Vol.18, No.7, pp.1634-1642, 2014. https://doi.org/10.6109/jkiice.2014.18.7.1634
- H. J. Hwang, K. Y. Kim, I. K. Ha, "A Digital Door Lock System Using Time- Synchronous One Time Password", Journal of the Korea Institute of Information and Communication Engineering, Vol.21, No.5, pp.1027-1034, 2017. https://doi.org/10.6109/jkiice.2017.21.5.1027