1 |
K. H. Kim, D. H. Yoo, S. H. Kim, B. J. Yoon, and H. Y. Youm, "Gap Analysis of ISO/IEC 29115 and ISO/IEC 29003 for Electronic Financial Services Environment in Korea," Review of Korean Society for Internet Information, Vol.16, No.2, pp.65-69, 2015.
|
2 |
K. Hong and K. Lee, "Advanced Mandatory Authentication Architecture Designed for Internet Bank," Journal of the Korea Institute of Information Security & Cryptology, Vol. 25, No.6, pp.1503-1514, 2015.
DOI
|
3 |
ISO/IEC 29115:2013, Information security - Security techniques - Entity authentication assurance framework.
|
4 |
ISO/IEC 2nd CD 29003, Information security - Security techniques - Identity proofing.
|
5 |
H. Yeuk, H. Yim, K. Lee, and K. Yim, "A Trend Analysis on Online Identity Verification methods," REVIEW OF KIISC, Vol.25, No.6, pp.28-46, 2015.
|
6 |
S. W. Lee, H. S. Kim, and K. Y. Yoo, "A Password - based Efficient Key Exchange Protocol," Journal of KISS : Information Networking, Vol.31, No.4, pp.347-352, 2004.
|
7 |
Y. J. Shin, S. H. Shin, J. Lee, and W. Han, "A Study on Improvement of Identification Means in R.O.K.," Journal of Korean Association for Regional Information Society, Vol.18, No.4, pp.59-88, 2015.
|
8 |
Financial Services Commission, "A Rationalization of Real Name Verification on the Account Opening," 2015.
|
9 |
J. Brainard, A. Juels, R. L. Rivest, M. Szydlo, and M. Yung, "Forth-Factor Authentication: Somebody You Know," in Proc. 13th ACM Conference on Computer and Communications Security, pp.167-178, Oct., 2006.
|
10 |
P. Hanacek, K. Malinka, and J. Schafer, "e-Banking security-A comparative study," IEEE Aerospace and Electronic Systems Magazine, Vol.25, No.1, pp.29-34, 2010.
DOI
|
11 |
NIST Special Publication, 800-63-2 Electronic Authentication Guideline.
|
12 |
OAuth 2.0 [Internet], https://oauth.net/.
|
13 |
X.1254 : Entity authentication assurance framework, May 2013.
|
14 |
H. Y. Youm, K. H. Kim, and S. H. Kim, "Guideline on Identity Proofing Management," TTA Journal, Vol.167, pp.78-82, 2016.
|
15 |
TTA Standard, "Guideline on Identity Proofing Management," TTAK.KO-12.0292, 2016.
|
16 |
FIDO Alliance [Internet], https://fidoalliance.org/.
|