1 |
Ministry of Citizens’ Services, Electronic Credential and Authentication Standard, 2010, April.
|
2 |
Bret Hartman, “From Identity Management to Authentication: Technology Evolution to Meet Cyber Threats”, ITAA IdentEvent 2008.
|
3 |
Fidelity National Information Services, Multi -Factor Authentication Risk Assessment, 2006.
|
4 |
OWASP foundation, OWASP Testing Guide, 2008 v3.0, pp.140-143.
|
5 |
IETF RFC 4683, Internet X.509 Public Key Infrastructure Subject Identification Method (SIM), 2006.10.
|
6 |
Tim Hastings, Multi-factor Authentication and the Cloud, 2010.
|
7 |
Korea Internet Security Agency, Introduction of i-PIN (http://i-pin.kisa.or.kr), 2010.
|
8 |
Accredited Certificate: http://www.rootca.or.kr
|
9 |
Public Procurement Service: http://www.g2b.go.kr
|
10 |
Public Procurement Service(PPS), Bidder Identification and Fingerprint Registration Process, 2010, April.
|
11 |
OMB M-04-04, E-Authentication Guidance for Federal agencies, 2003, December, 16.
|
12 |
NIST, Special Publication 800-63, Electronic Authentication Guideline, 2006, April.
|
13 |
Smart Card Alliance (Randy Vanderhoof), “Smart Card Technology Roadmap for secure ID applications”, 2003.
|
14 |
Dale Vile, Freeform Dynamic, “User convenience versus system security”, 2006.
|
15 |
Roger Elrod, “Two-factor Authentication”, East Carolina University, 2005, July.
|
16 |
[Definition] Wikipedia, Definition of Two Factor Authentication.
|