1 |
S. J. Oh, "A Cross-cultural Study on the Perception Types of Korean and American Users of Smartphone," Journal of the Korean society for Wellness, vol. 11, no. 3, pp. 1-21, Aug. 2016.
|
2 |
S. R. Cho, D. S. Choi, S. H. Jin, and H. H. Lee, "Passwordless Authentication Technology-FIDO," Electronics and Telecommunications Trends, vol. 29, no. 4, pp. 101-109, Aug. 2014.
|
3 |
S. J. Kim, "Information Security Plan on Cloud Computing - Information Security Management System," Korean Review of Management Consulting, vol. 1, no. 2, pp. 194-208, Aug. 2010.
|
4 |
F. Zhang, A. Kondoro, and S. Muftic, "Location-Based Authentication and Authorization Using Smart Phones," 2012 IEEE 11th International Conference on Trust, Security, and Policy in Computing and Communications, pp. 1285-1292, June 2012.
|
5 |
H. Takamizawa, and N. Tanaka, "Authentication system using location information on ipad or smartphone" International Journal of Computer Theory and Engineering, vol. 4, no. 2, pp.153-157, April 2012.
|
6 |
W. Jansen, and V. Korolev, "A location-based mechanism for mobile device security," Computer Science and Information Engineering, 2009 WRI World Congress on IEEE, vol. 1, pp. 99-104, March 2009.
|
7 |
H. Ketabdar, K. A. Yuksel, A. Jahnbekarn, M. Roshandel, and D. Skirop, "MagiSign: User Identification /Authentication Based on 3D Around Device Magnetic Signatures," The Fourth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 31-34, 2010.
|
8 |
J. S. Seo, and J. S. Moon, "A Study on User Authentication with Smartphone Accelerometer Sensor," Journal of The Korea Institute of Information Security and Cryptology, vol. 25, no. 6, pp. 1477-1484, Dec. 2015.
DOI
|
9 |
T. K. Lee, Y. H. Kim, and E. G. Im, "Biometric User Authentication Method of Mobile Appilication in Trustable Space," Journal of The Korea Institute of Information Security and Cryptology, vol. 27, no. 2, pp. 201-212, April 2017.
DOI
|
10 |
A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, "The Phone Lock: Audio and Haptic Shoulder-Surfing Resistant PIN Entry Methods for Mobile Devices," TEI'11 Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, pp. 197-200, Jan. 2011.
|