Fig. 1. Diagram of Secure Agent Process
Fig. 2. Initial user authentication
Fig. 3. Registration or modification
Fig. 4. The 2nd user authentication
Table 1. Characteristic of the proposed system
참고문헌
- H. G. Kim et al, (2011). A Study on One-Time Password Authentication Scheme in Mobile Environment. Journal of Korea Multi- media Society, 14(6), 785-793. https://doi.org/10.9717/kmms.2011.14.6.785
- H. R. Ryu et al. (2014). Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives. Journal of Internet Computing and Services(JICS), 15(3), 79-90. https://doi.org/10.7472/jksii.2014.15.3.79
- NCC. (2016. 8). Information Security. http://www.nacr.cz/dlm/presentations/dresdner.pdf.
- S. R. Kim. (2016). Design of a User Authentication System using the Device Constant Information. Journal of Convergence for Information Technology, 6(3), 29-35. https://doi.org/10.22156/CS4SMB.2016.6.3.029
- S. Hong. (2014). ARP spoofing attack and its countermeasures. Journal of Convergence for Information Technology, 4(1), 47-53. https://doi.org/10.22156/CS4SMB.2014.4.1.047
- I. G. Jeun. (2011). Domestic password usage and encryption Implementation Guide, KISA.
- P. Cobbaut. (2015). Linux Security. http://linux-training.be/linuxsec.pdf
- S. Shin & K. Han. (2015). A Study Intergrated ID Authentication Protocol for Web User. Journal of Digital Convergence, 13(7), 197-205. DOI : 10.14400/JDC.2015.13.7.197
- Microsoft. (2018). Azure Network Security, Microsoft.
- RSA. RSA SecurID(R)Access. https://www.rsa.com/ko-kr/products/rsa-securid-suite/rsa-securid-access.