References
- Y. Ko, J. Choi & B. Kim. (2012). Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center, Journal of the Korea Institute of Information Security & Cryptology, 22(2), 391-400.
- T. Y. Kim, H. J. Jun & T. S. Kim. (2018). An Analysis on Intention to Use Information Service for Personal Information Breach, Journal of the Korea Institute of Information Security & Cryptology, 28(1), 199-213. https://doi.org/10.13089/JKIISC.2018.28.1.199
- T. H. Park, G. R. Lee & H. W. Kim. (2017). Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment, Journal of the Korea Institute of Information Security & Cryptology, 27(5), 1149-1155. DOI : 10.13089/JKIISC.2017.27.5.1149
- H. J. Mum, (2018). Biometric Information and OTP based on Authentication Mechanism using Blockchain, Journal of Convergence for Information Technology, 8(3), 85-90. https://doi.org/10.22156/CS4SMB.2018.8.3.085
- S. H. Lee, (2014). User Authentication Using Biometrics and OTP in Mobile Device, Journal of Convergence for Information Technology, 4(3), 27-31.
- S. S. Ji, (2012). The Improved-Scheme of Two Factor Authentication using SMS, Journal of the Korea Industrial Information Systems Research, 17(6), 25-30. DOI : 10.9723/jksiis.2012.17.6.025
- S. J. Kim & S. S. Yeo, (2013). A Study on Secure Data Access Control in Mobile Cloud Environment, Journal of Digital Convergence, 11(2), 317-322. https://doi.org/10.14400/JDPM.2013.11.2.317
- H. T. Chae & S. J. Lee, (2014). Security Policy Proposals through PC Security Solution Log Analysis - Prevention Leakage of Personal Information, Journal of the Korea Institute of Information Security & Cryptology, 24(5), 961-968. DOI : 10.13089/JKIISC.2014.24.5.961
- S. Khandelwal. (2016). QRLJacking - Hacking Technique to Hijack QR Code Based Quick Login System. The Hacker New(Online). https://thehackernews.com/2016/07/qrljacking-hackingqr-code.html
- Google. (2018). Google Cloud Vision API. Google Cloud Vision(Online). https://cloud.google.com/vision
- Y. J. Shin, S. H. Shin, J. S. Lee & W. G. Han, (2015). A Study on Improvement of Identification Means in R.O.K, Journal of Korean Associastion for Regional Information Society, 18(4), 59-88.
- D. J. Kim & H. S. Choi, (2009). Design on Protection and Authentication System of IPTV Contents using OTP, Journal of The Korea Ccontens Association, 9(8), 129-137. DOI : 10.5392/JKCA.2009.9.8.129
- C. J. Chae, H. J. Cho & H. M. Jung, (2018). Authentication Method using Multiple Biometric Information in FIDO Environment, Journal of Digital Convergence, 16(1), 159-164. https://doi.org/10.14400/JDC.2018.16.1.159
- J. S. Seo & J. S. Moon, (2015). A Study on User Authentication with Smartphone Accelerometer Sensor, Journal of The Korea Institute of Information Security and Cryptology, 25(6), 1477-1484. DOI : 10.13089/JKIISC.2015.25.6.1477
- H. Ketabdar, K. A. Yuksel, A. Jahnbekarn, M. Roshandel & D. Skirop, (2010). MagiSign: User Identification /Authentication Based on 3D Around Device Magnetic Signatures, Proc. Of UBICOMM'10, 31-34.