1 |
CSID, "Consumer Survey: Password Habits" https://www.csid.com/wp-content/uploads/2012/09/CS_PasswordSurvey_FullReport_FINAL.pdf, Sep. 2012
|
2 |
D. Maltoni, D. Maio, A.K. Jain, and, S. Prabhakar, Handbook of fingerprint recognition, 2nd Ed., Springer Science & Business Media, Apr. 2009.
|
3 |
A.K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP Journal on Advances in Signal Processing, Jan. 2008
|
4 |
C. Roberts, "Biometric attack vectors and defences." Computers & Security, vol. 26.1, pp. 14-25, Feb. 2007
DOI
|
5 |
TTA, "Biometric Authentication Framework based on One-Time Template", TTAK.KO-12.0098, Dec 2008
|
6 |
Woo Yong Choi, Yongwha Chung, Jin-Won Park and Dowon Hong, "Fingerprint Template Protection Using One-Time Fuzzy Vault," KSII Transactions on Internet and Information Systems, vol. 5, no. 11, pp. 2221-2234, Nov 2011.
DOI
|
7 |
Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, and Okyeon Yi "Fingerprint template protection using fuzzy vault." International Conference on Computational Science and Its Applications, LNCS 4707, pp. 1141-1151, 2007.
|
8 |
Bank Of Korea, "Seminar on promotio n of biometric authentication in finan cial sector" https://www.bok.or.kr/viewer/skin/doc.html?fn=FILE_201803300815507562.pdf&rs=/webview/result/P0000559/201507, Jul 2015
|
9 |
FIDO Alliance, "FIDO UAF Architectu ral Overview 1.0" , https://fidoalliance.org/specs/fido-uaf-v1.0-ps-20141208/fido-uaf-overview-v1.0-ps-20141208.html, Dec 2014.
|
10 |
ETRI, "Passwordless Authentication Technology-FIDO", Electronics and Telecommnucations Trends, vol. 29. no. 4, pp. 101-109, Aug 2014.
|
11 |
G. Zyskind, O. Nathan, and A. Pentland, "Decentralizing privacy: Using blockchain to protect personal data," IEEE Security and Privacy Workshops (SPW), pp. 180-184, May. 2015.
|
12 |
A.C. Yao, "Protocols for secure computations." Foundations of Computer Science, 1982. SFCS'08. 23rd Annual Symposium on. IEEE, Nov 1982.
|
13 |
M. Fukumitsu, S. Hasegawa, J. Iwazaki, M. Sakai, D. Takahashi "A Proposal of a Secure P2P-type Storage Scheme by using the Secret Sharing and the Blockchain," IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 803-810, Mar. 2017.
|
14 |
A. Shamir, "How to share a secret." Communications of the ACM vol. 22. no. 11 pp. 612-613, Nov 1979.
DOI
|
15 |
V. Buterin, "A next-generation smart contract and decentralized application platform." white paper 2014.
|
16 |
A. Azaria, A. Ekblaw, T. Vieira, A. Lippman "Medrec: Using blockchain for medical data access and permission management." Open and Big Data (OBD), International Conference on. IEEE, Aug. 2016.
|
17 |
W. Stallings, Cryptography and network security: principles and practices, 4th Ed., Prentice Hall, Nov. 2005.
|
18 |
K. Wust and A. Gervais. "Do you need a Blockchain?." IACR Cryptology ePrint Archive 2017-375, Apr. 2017.
|
19 |
N. Satoshi, "Bitcoin: A peer-to-peer electronic cash system.", 2008.
|
20 |
A.M. Antonopoulos, Mastering Bitcoin: unlocking digital cryptocurrencies, 1st Ed., O'Reilly Media, Inc, Dec. 2014.
|
21 |
A. Juels and M. Wattenberg. "A fuzzy commitment scheme," CCS '99 Proceedings of the 6th ACM conference on Computer and communications security, pp. 28-36, Nov. 1999
|