1 |
C. Xiao-rong, F. Qi-yuan, D. Chao, and Z. Ming-quan, "Research and realization of authentication technique based on OTP and Kerberos," In Proceedings of Eighth International Conference on High-Performance Computing in Asia-Pacific Region, pp. 409, Jul. 2005.
|
2 |
Foo Kune, Denis, and Yongdae Kim, "Timing attacks on pin input devices," Proceedings of the 17th ACM Conference on Computer and Communications security, pp. 678-680, Oct. 2010.
|
3 |
C. Mulliner, R. Borgaonkar, P. Stewin, and J.P. Seifert, "SMS-based one-time passwords: attacks and defense," Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Springer Berlin Heidelberg, pp. 150-159, Jul. 2013.
|
4 |
G.A. Alvarez and P. Cavanagh, "The capacity of visual short-term memory is set both by visual information load and by number of objects," Psychological Science vol.15, no.2, pp. 106-111, Feb. 2004.
DOI
|
5 |
PCI Security Standards Council, "Information supplement: ATM security guideline", Jan. 2013.
|
6 |
The Bank of Korea, "Use of internet banking services during Q3 2016", Nov. 2016.
|
7 |
Korea Internet and Security Agency, "2016 Survey on information security (individual) executive summary", Jan. 2017.
|
8 |
Financial Security Agency, "Guide to financial applications of cryptographic techniques", Nov. 2014.
|
9 |
S.H. Kim, M.S. Park, and S.J. Kim, "Shoulder surfing attack modeling and security analysis on commercial keypad schemes", Journal of The Korea Institute of Information Security & Cryptology, 24(6), pp. 1159-1174, Dec. 2014 .
DOI
|
10 |
H. Kim, H. Kim, Y. Lee, T. Park, and H. Seo, "Realization of virtual security keypad against shoulder surfing attack," Journal of The Korea Institute of Information Security & Cryptology, 23(6), pp. 21-29, Dec. 2013.
|
11 |
H. Seo and H. Kim, "Design of Security Keypad Against Key Stroke Inference Attack", Journal of The Korea Institute of Information Security & Cryptology, 26(1), pp. 41-47, Feb. 2016.
DOI
|
12 |
I. Kim, "Keypad against brute force attacks on smartphones," IET Information Security, vol. 6, no. 2, pp. 71-76, Jun. 2012.
DOI
|
13 |
V. Roth, K. Richter, and R. Freidinger, "PIN-entry method resilient against shoulder surfing," In Proceedings of the 11th ACM Conference on Computer and Communications Security pp. 236-245, Oct. 2004.
|
14 |
T. Kwon, S. Shin, and S. Na, "Covert attentional shoulder surfing: Human adversaries are more powerful than expected," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.44, no.6, pp.716-727, Jun. 2014.
DOI
|
15 |
K. Kim, "A study on user authentication based on One-Time Password", Journal of The Korea Institute of Information Security & Cryptology, 17(3), pp. 26-31, Jun. 2007.
|
16 |
P. Marquardt, A. Verma, H. Carter, and P. Traynor, "(sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers," Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 551-562, Oct. 2011.
|
17 |
A. Maiti, M. Jadliwala, and C. Weber, "Preventing shoulder surfing using randomized augmented reality keyboards," Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 630-635, Mar. 2017.
|
18 |
S. Choi, "Inputting system and method for security key using one time keypad", Korean Patent, 10-1629495, Jan. 2017.
|
19 |
K. Kim "One-Time Password (OTP) integrated authentication service framework", TTA Journal, 153(5), pp. 56-61, May 2014.
|