Browse > Article

패턴 기반 사용자 인증 시스템 기술 연구 동향 및 비교  

Shin, Hyungjune (중앙대학교 컴퓨터공학과)
Hur, Junbeom (고려대학교 컴퓨터학과)
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A. Jain, A. Ross, and S. Pankanti, "Biometrics: a tool for information security," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp.125-143, June 2006   DOI
2 D. V. Klein, "Foiling the cracker: a survey of, and improvements to, password security," in Proc. 2nd USENIX Workshop Security, 1990, pp.5-14
3 William Stallings and Lawrie Brown, "Computer Security: Principles and Practice. 2nd Edition", Pearson, 2011
4 L. Findlater, J. O. Wobbrock, and D. Wigdor, "Typing on flat glass: Examining ten-finger expert typing patterns on touch surfaces", in Proc. Annu. Conf. Human Factors Comput. Syst.,pp.2453-2462, 2011
5 H. L and Y. Li, "Gesture avatar: A technique for operating mobile user interfaces using gestures", in Proc. Annu. Conf. Human Factors Comput. Syst.,pp.207-216, 2011
6 Wigdor, D., Forlines, C., Baudisch, P., Barnwell, J., and Shen, C. "LucidTouch: a see-through mobile device",. Proc. UIST 2007, ACM Press., pp.269-278, 2007
7 Napa Sae-Bae, Nasir Memon, Katherine Isbister, and Kowsar Ahmed, "Multitouch Gesture-Based Authentication", 2014 IEEE Transactions on Information Forensics and Security, pp.568-582, April 2014
8 Mohammad Sarosh Umar, Mohammad Qasim Rafiq, "Select-to-Spawn: A Novel Recognition-based Graphical User Authentication Scheme", 2012 IEEE International Conference on Signal Processing, Computing and Control (ISPCC), pp.1-5, March 2012
9 Mizuki Oka, Kazuhiko Kato, Yingqing Xu, Lin Liang, and Fang Wen, "Scribble-a-Secret: Similarity-Based Password Authentication Using Sketches", 19th International Conference on Pattern Recognition (ICPR), pp.1-4, Dec 2008
10 Mohammad Sarosh Umar, Mohammad Oasim Rafiq, "A Graphical Interface for User Authentication on Mobile Phones", 4th International Conference on Advances in Computer-Human Interactions, pp.69-74, 2011
11 김종우, 김성환, 김광휘, 조환규, "훔쳐보기 공격에 견고한 그리드 기반 패스워드 시스템의 개선", 정보과학회논문지, 17(4), April 2011
12 Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, and Frank Stajano, "The Quest to Replace Passwords: A Framwork for Comparative Evaluation of Web Authentication Scheme", 2012 IEEE Symposium on Security and Privacy, pp.553-567, May 2012
13 Kim, I., "Keypad against brute force attacks on smartphones ", Information Security, IET, pp.71-76, June 2012
14 Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith, "Smudge Attacks on Smartphone Touch Screens", WOOT10 Proceedings of the 4th USENIX conference on Offensive technologies, Article no 1-7, August 2010.
15 http://www.groovypost.com/howto/security/how-to-enable-pattern-lock-security-on-android-devices/, accessed May 2011