1 |
Joe Heinrich, "MIPS R4000 Microprocessor User's Manual", 2nd Ed., MIPS Technologies Inc., 1994
|
2 |
http://www.boannews.com/media/view.asp?page=1&gpage=1&idx=6789&search=title&find=&kind=2
|
3 |
L. Sobrado, J. C. Birget, "Graphical passwords", The Rutgers Scholar, vol.4, Sep. 2002
|
4 |
Mark E. Russinovich, David A. Solomon, "Windows Internals", Microsoft press, Dec. 2004
|
5 |
"LSI-11, PDP-11/03 User's Manual", Digital Equipment Corporation, 1975
|
6 |
"M68000 8-/16-/32-bit Microprocessors User's Manual", 9th Ed., 1993
|
7 |
이만영, 염흥열, 송유진, 김지홍, "최신 정보보호개론", pp.201-220, 홍릉과학출판사, 2005년 2월
|
8 |
"Passfaces:Next Generation Graphical Authentication", http://www.passfaces.com/enterprise/index.htm
|
9 |
Susan Wiedenbeck, et al., "PassPoints:design and longitudinal evaluation of a graphical password system", International Journal of Human-Computer Studies, v.63 n.1-2, p.102-127, July 2005
DOI
ScienceOn
|
10 |
"Intel Architecture Software Developer's Manual :Vol.3 System Programming", Intel Corporation, 1999
|
11 |
배광진, 임강빈, "키보드 보안의 근본적인 취약점 분석", 한국정보보호학회 논문집 제18권 제3호, 2008년 6월
과학기술학회마을
|
12 |
S. Man, D. Hong, B. Hayes, M. Matthews, "A password scheme strongly resistant to spyware", Proc. Int. Conf. on Security and Management, Las Vegas, pp.94-100, 2004
|
13 |
"KDF11-AA User's Guide", Digital Equipment Corporation, 1979
|