1 |
D. McDonald and R. Atkinson, "One-time passwords in everything(OPIE): Experiences with building and using stronger authentication," Proceedings of the 5th USENIX Security Symposium, 1995
|
2 |
B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Optical Engineering Vol.33, pp1752-1756, 1994
DOI
|
3 |
R. Arizaga and R. Torroba, "Validation through a binary key code and a polarization sensitive digital technique," Optics Communications, Vol.215(1), pp31-36, 2003
DOI
|
4 |
12. X. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006).
DOI
|
5 |
X. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Optics Letter. Vol. 31(10), pp1414-1416, 2006
DOI
|
6 |
S-K Gil, "Application to 2-D page-oriented data optical cryptography based on CFB mode," j.inst.Korean.electr.electron.eng., Vol.19(3), pp424 -430, 1994
|
7 |
S. K. Gil, S. H. Jeon, and J. R. Jeong, "Security enhanced optical one-time password authentication method by using digital holography," Proceedings of SPIE, Vol.9386, pp93860U, 2015
|
8 |
S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," Journal of the Optical Society of Korea, Vol.16(4), pp354-364, 2012
DOI
|