Browse > Article

모바일 지갑을 위한 스마트 채널 보안 기술 동향  

Ma, Gun-Il (숭실대학교 대학원 컴퓨터학과)
Yi, Jeong-Hyun (숭실대학교 컴퓨터학부)
Choi, Dae-Seon (한국전자통신연구원)
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 C. Soriente, G. Tsudik, and E. Uzun, "BEDA: Button-enabled device association", International Workshop on Security for Spontaneous Interaction, Sep. 2007.
2 C. Soriente, G. Tsudik, and E. Uzun, "HAPADEP: Human-assisted pure audio device pairing", International Security Conference, pp. 385-400, Sep. 2008.
3 A. Kumar, N. Saxena, G. Tsudik, and E. Uzun, "Caveat emptor: A comparative study of secure device pairing methods", IEEE International Conference on Pervasive Computing and Communications, pp. 1-10, May 2009.
4 R. Kainda, I. Flechais, and A.W. Roscoe, "Usability and security of out-of-band channels in secure device pairing protocols", Symposium On Usable Privacy and Security, July 2009.
5 R. Mayrhofer and H. Gellersen, "Shake well before use: Intutive and secure pairing of mobile devices", IEEE Transaction on Mobile Computing, pp. 792-806, 2009.   DOI
6 R.L. Rivest and A. Shamir, "How to expose an eavesdropper", Communications of ACM, vol. 27, no. 4, pp. 393-394, April 1984   DOI
7 N. Saxena and M. Uddin, "Secure pairing of 'Interface-Constrained' devices resistant against rushing user behavior", Applied Cryptography and Network Security, pp. 34-52, June 2009.
8 A. Perrig and D. Song, "Hash visualization: A new technique to improve real-world security", Cryptographic Techniques and E-Commerce, pp. 131-138, 1999.
9 I. Goldberg. "Visual key fingerprint Code", 1996.
10 J.M. McCune, A. Perrig, and M.K. Reiter, "Seeing-is-Believing: Using camera phones for human-verifiable authentication", IEEE Symposium on Security and Privacy, pp. 110-124, May 2005.
11 N. Saxena, "Secure device paring based on a visual channel", IEEE Symposium on Security and Privacy, pp. 306-313, May 2006.
12 S. Laur, N. Asokan and K. Nyberg, "Efficient mutual data authentication using manually authentication strings", Cryptography and Network Security, pp. 90-107, Dec 2006.
13 M.T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. "Loud and clear: Human-verifiable authentication based on audio", IEEE International Conference on Distributed Computing Systems, July 2006.
14 B.A. Forouzan, Cryptography and network security, 1th Ed., McGraw-Hill, 2008.
15 최대선, 진승헌, "모바일 ID 보안 및 프라이버시를 위한 스마트 지갑", 정보과학회지, 27(12), pp.50-59, 2009년.
16 W. Diffie and M.E. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.