1 |
Jian Wang, Nan Jiang, "Secure Authentication and Authorization Scheme for Mobile Devices," Proceedings of ICCTA2009, 2009.
|
2 |
Woonho Jung, "A Trends of Mobile payments and alternative authentication certificate," http://www.t-town.co.kr:8080/images/Event/2014tech/5_tmonet_mobilepay.pdf, LG CNS, 14th, May, 2014.
|
3 |
Seungjin Han, A Financial Security using Mobile Biometrics Application and Technology, Technical Report, KISA, March, 2014.
|
4 |
Seungjin Han, "A Framework for Biometric Security based on OTP in Mobile Devices," Journal of The Korea Society of Computer and Information, Vol. 17, No. 4, pp. 121-127, Apr. 2012.
과학기술학회마을
DOI
ScienceOn
|
5 |
M. Gordon and S. Sankaeanaeayanan, "Biometric Security Mechanism in Mobile Payments", Proc., of the 5th National Conference; INDIACom-2011, Computing For Nation Development, March 10-11, 2011.
|
6 |
Bao, X, Wang, J. and Hu, J, "Method of Individual Identification based on Electroencephalogram Analysis", Proc., of 2009 International Conference on New Trends in Information and Service Science, pp. 390-393, Beijing, P.R.China, June 9-July 2, 2009.
|
7 |
Nakanishi, I, Baba, S and Miyamoto, C, "EEG Based Biometric Authentication Using New Spectral Features", Proc., of 2009 International Symposium on Intelligent Signal Processing and Communication Systems, pp. 651-654, Kanazawa, Ishikawa, Japan, December 7-9, 2009.
|
8 |
http://www.huffingtonpost.com/2011/10/19/face-unlock-ice-cream-sandwich_n_1020207.html
|
9 |
Daugman, J, "How Iris Recognition Works", IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, Jan., 2004.
DOI
ScienceOn
|
10 |
ITU-T, "A Guideline to Technical and Operational Countermeasures for Telebiometric Applications using Mobile Devices," Comm. 3rd Draft Recommendation ITU-T X.1087(X.tam)
|
11 |
Namho, Kim, A Study on the Mobile OTP Key Creation Method using Biometrics Information, Doctoral dissertation, Computer science and Statistics of Chonnam Univ., Feb., 2013.
|
12 |
Lin You, et. al., "Signature Systems on Smart Card with Keys Generated by Fingerprint," pp. 675-679, ICACT2006, Feb. 20-22, 2006.
|
13 |
Chin-Ling Chen, Jinn-Ke Jan, and Chih-Feng Chien, "Using Mobile Device to Design A Secure Transaction," 2010 International Conference on Complex, Intelligent and Software Intensive Systems, IEEE, Krakow, 15-18 Feb. 2010.
|
14 |
Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer and Stephane Tinguely, "Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards", Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002.
|
15 |
W. Diffie and M. Hellman, "New Directions on Cryptography," IEEE Transactions on Information Theory, IT-22(6): pp. 644-654, Nov., 1976.
|
16 |
Y. Zheng, D. K. He, X. H. Tang and, H. X. Wang, "AKA and Authtentication Scheme for 4G Mobile Networks Based on Trusted Mobile Platform", ICICS 2005, pp. 976-980, 2005.
|
17 |
3GPP TS 24.002, Release 4. GSM-UMTS public land mobile network access reference configuration, June, 2003.
|