참고문헌
- L.T. Ha and D.J. Choi, "Biometrics-based Key Generation Research: Accomplishments and Challenges," Smart Media Journal, vol. 6, no. 2, pp. 15-25, 2017.
- H.T. Tran, I.S. Na, Y.C. Kim and S.H. Kim, "Human Face Tracking and Modeling using Active Appearance Model with Motion Estimation," Smart Media Journal, vol. 6, no. 3, pp. 49-56, 2017.
- D.N. Tai, S.H. Kim, G.S. Lee, H.J. Yang, I.S. Na and A.R. Oh, "Tracking by Detection of Multiple Faces using SSD and CNN Features," Smart Media Journal, vol. 7, no. 4, pp. 61-69, 2018. https://doi.org/10.30693/SMJ.2018.7.4.61
- B. Bostjan, T. Viktor, "Moore's curse on textual passwords," 38th International Convention on Information and Communication Technology, Electronics and Microelectronics(MIPRO), pp. 25-29, 2015.
- P. G. Inglesant & M. A. Sasse. "The true cost of unusable password policies: Password use in the wild," In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 383-392, 2010.
- D. Florencio, & C. Herley. "A large scale study of web password habits," In Proceedings of the 16th International Conference on World Wide Web, pp. 657-666, 2007.
- S. K. Moon. "An Empirical study on the analysis of the re-using of four-digit personal identification numbers -A university case," Journal of Digital Policy & Management, vol. 11, no. 10, pp. 737-746, 2013.
- R. Shay, S. Komanduri, P. G. Kelley, L. Bauer, P. G. Leon, N. Christin, M. L. Mazur & L. F. Cranor, "Encountering stronger password requirements: User attitudes and behaviors," Symposium on Usable Privacy and Security (SOUPS), July, pp. 14-16, 2010.
- A. S. Brown, E. Bracken, S. Zoccoli & K. Douglas, "Generating and remembering passwords," Applied Cognitive Psychology, 18, pp. 641-651, 2004. https://doi.org/10.1002/acp.1014
- G. Beate & J. Hilary, "Using and managing multiple passwords : A Week to a View," Interacting with Computers, 23, pp. 256-267, 2011. https://doi.org/10.1016/j.intcom.2011.03.007
- Bersch, C. Outdated, "insecure passwords are losing money for Internet businesses," Communications News, 37, pp. 10-11, 2000.
- R. Dhamija & A. Perrig, "Deja vu: a user study. Using images for authentication," Proceedings of the 9th USENIX Security Symposium, Denver, Colorado. 2000.
- S. Komanduri, et al., "Of passwords and people: Measuring the effect of password composition policies," In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2595-2604, 2011.
- A. Adams & M. A. Sasse, "Users are not the enemy," Communications of the ACM, vol. 42, no. 12, pp. 40-46, 1999. https://doi.org/10.1145/322796.322806
- Most common iPhone passcodes(2011), http://amitay.us/blog/files/most_common_iphone_passcodes.php (accessed Apr., 24, 2013).
- S. K. Moon, "A case study on comparative analysis of four-digit passwords usage type before and after using smart phone," Journal of Convergence for Information Technology, vol. 8, no. 7, pp. 615-622, 2018. https://doi.org/10.4156/jcit.vol8.issue7.77