1 |
C. Vivaracho-Pascual, J. Pascual-Gaspar, On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 1-10, 2011.
|
2 |
E. J. Choi, KaKaoTalk Mobile App Case Study, http://www.korea-marketing.com/kakaotalkmobile- app-case-study/
|
3 |
S. H. Yun, The USIM based Biometric Multi- Signature for Mobile Content Authentication, ICONI 2011, pp. 137-141, 2011.
|
4 |
N. K. Ratha, J. H. Connell, R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001.
DOI
ScienceOn
|
5 |
Apple Support, iPhone 5s: Using Touch ID, http://support.apple.com/kb/HT5883
|
6 |
B. S. Yu, S. H. Yun, The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing, Journal of the Korea Convergence Society, Vol. 1, No. 1, pp. 9-14, 2010.
|
7 |
The 3GPP Project, Characteristics of the USIM Application, 3GPP TS 31.02, http://www.3gpp.org/ftp/Specs/html-info/31102.htm.
|
8 |
S. H. Yun, H. S. Lim, Y. S. Jeong, S. Y. Jung, J. K. Chang, The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits, Wireless Personal Communications, Springer, Vol. 60, No. 3, pp. 405-418, 2011.
DOI
|
9 |
ITU-T X.1088, A Framework for Biometric Digital Key Generation, ITU-T, 2008.
|
10 |
D. M. Burton, Elementary Number Theory, McGraw-Hill Science/Engineering/Math, 2010.
|