References
- J. W. Jung, J. D. Kim, M. G. Song & C. G. Jin. (2015). A study on Development of Certification Schemes for Cloud Security, The Journal of digital policy & management, 13(8), 43-49. DOI: 10.14400/JDC.2015.13.8.43
- S. H. Hong. (2012). New Authentication Methods based on User's Behavior Big Data Analysis on Cloud, Journal of Convergence for Information Technology, 2(2), 35-41. DOI: 10.22156/CS4SMB.2016.6.4.031
- M. K. Choi, T. C. Kwan & D. H. Lee. (2013). Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone, Journal of The Korea Institute of Information Security and Cryptology, 23(1), 19-32. DOI: 10.13089/jkiisc.2013.23.1.019
- S. J. Kim. (2010). Information Security Plan on Cloud Computing - Information Security Management System, Korean Review of Management Consulting, 1(2), 194- 208.
- Y. Ko, J. Choi & B. Kim. (2012). Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center, Journal of the Korea Institute of Information Security & Cryptology, 22(2), 391-400.
- J. H. Kim, J. Y. Go & K. H. Lee. (2015). A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing, Journal of the Korea Convergence Society, 6(1), 85-91. DOI : 10.15207/JKCS.2015.6.1.085
- T. H. Park, G. R. Lee & H. W. Kim. (2017). Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment, Journal of the Korea Institute of Information Security & Cryptology, 27(5), 1149-1155. DOI : 10.13089/JKIISC.2017.27.5.1149
- H. J. Mum. (2018). Biometric Information and OTP based on Authentication Mechanism using Blockchain, Journal of Convergence for Information Technology, 8(3), 85-90. https://doi.org/10.22156/CS4SMB.2018.8.3.085
- F. Zhang, A. Kondoro & S. Muftic. (2012). Location-Based Authentication and Authorization Using Smart Phones, TRUSTCOM '12 Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 1285-1292. DOI : 10.1109/TrustCom.2012.198
- H. Takamizawa & N. Tanaka. (2012). Authentication system using location information on ipad or smartphone, International Journal of Computer Theory and Engineering, 4(2), 153-157. https://doi.org/10.7763/IJCTE.2012.V4.441
- W. Jansen & V. Korolev. (2009). A location-based mechanism for mobile device security, Computer Science and Information Engineering, 2009 WRI World Congress on IEEE, 1, 99-104. DOI : 10.9723/jksiis.2012.17.6.025
- H. Ketabdar, K. A. Yuksel, A. Jahnbekarn, M. Roshandel & D. Skirop. (2010). MagiSign: User Identification/Authentication Based on 3D Around Device Magnetic Signatures, Proc. Of UBICOMM'10, 31-34.
- J. S. Seo & J. S. Moon. (2015). A Study on User Authentication with Smartphone Accelerometer Sensor, Journal of The Korea Institute of Information Security and Cryptology, 25(2), 1477-1484. https://doi.org/10.13089/JKIISC.2015.25.6.1477
- A. Bianchi, I. Oakley, V. Kostakos & D. S. Kwon. (2011). The Phone Lock: Audio and Haptic Shoulder-Surfing Resistant PIN Entry Methods for Mobile Devices, TEI'11 Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, 197- 200.
- T. K. Lee, Y. H. Kim & E. G. Im. (2017). Biometric User Authentication Method of Mobile Appilication in Trustable Space, Journal of The Korea Institute of Information Security and Cryptology, 27(2), 201-212. https://doi.org/10.13089/JKIISC.2017.27.2.201