1 |
S.K. Park, J.H. Lee, "Smarwork Technology and Standardization", Telecommunications Technology Assocition Journal, Vol. 136, pp.79-84
|
2 |
M.S Jeong, D.B Lee, J. Kwak, "Analysis of Smartwork Security Threats and Security Requirements", Korea Institute of Information Security & Cryptology, Journal of Information Security, Vol. 21 No. 5, pp55-63, 2011.
|
3 |
K.H, Lee, "Facial Recognition Technology Trends"
|
4 |
L. Lamport, "Password Authentication with Insecure Communication", Communications of ACM 24, Vol. 24. No.11. pp. 770-772, Nov. 1981.
DOI
ScienceOn
|
5 |
M.S. Hwang, L.H. Li, "A New Remote User Authentication Scheme Using Smart Cards", IEEE Transactions on Consumer Electronics Vol. 46. No. 1 pp. 28-.30. Feb. 2000.
DOI
ScienceOn
|
6 |
M.K. Khan, S.K. Kim, "Cryptanalysis and Security Enhancement of a 'more Efficient & Secure Dynamic ID-based Remote User Authentication Scheme', Computer Communications, Vol. 34, pp. 305-309, 2011.
DOI
ScienceOn
|
7 |
M. Scott, "Cryptanalysis of an ID-based Password Authentication Scheme Using Smart Cards and Fingerprints", ACM SIGOPS Operating Systems Review, 2004.
|
8 |
I. E. Liao, C. C. Lee, M. S, Hwang, "A Password Authentication Scheme Over Insecure Networks", Journal of Computer and System Sciences, Vol. 72, pp. 727-740, 2006.
DOI
ScienceOn
|
9 |
S. Lee, I. Ong, H. T. Lim, H. J. Lee, "Two Factor Authentication for Cloud Computing", International journal of KIMICS, Vol. 8, No. 4, pp. 427-432, Aug. 2010
|