1 |
Samsung Galaxy fold 5G(2019). https://www.samsung.com/sec/smartphones/galaxy-foldsm-f907/SM-F907NZSAKOO/ (accessed Feb ruary 19, 2021).
|
2 |
Motorola razr(2020). https://www.motorola.co.uk/smartphones-razr (accessed February 19, 2021).
|
3 |
Royole FlexPai 2 5G(2020). https://global.royole.com/en/flexpai (accessed February 19, 2021).
|
4 |
Huawei Mate Xs 5G(2019). https://consumer.huawei.com/kr/phones/mate-x-s/ (accessed February 19, 2021).
|
5 |
Tech yourself Foldable Phones in 10 steps: Report(2018). https://www.slashgear.com/samsung-galaxy-foldable-smartphone-details-analysis-industry-market-14557949/ (accessed February 19, 2021).
|
6 |
Folding the Web Enabling real responsive design on foldable devices(2020). https://medium.com/samsung-internet-dev/folding-the-web-90952c925d52 (accessed February 19, 2021).
|
7 |
Foldables to Hit 100 Million by 2025(2020). https://www.strategyanalytics.com/access-services/devices/mobile-phones/emerging-device-technologies/reports/report-detail/foldables-to-hit-100-million-by-2025 (accessed February 19, 2021).
|
8 |
Samsung Electronics earnings outlook: Promoting popularization of foldable smartphones next year(2020). http://www.thelec.kr/news/articleView.html?idxno=8543 (accessed February 19, 2021).
|
9 |
iPhone Flip: Everything we know about Apple's foldable phone plans(2021). https://www.tomsguide.com/news/iphone-flip-everythingwe-know-about-apples-foldable-phone-plans (accessed February 20, 2021).
|
10 |
From the 'Brick' to New Foldable Phones: The History of the Mobile Form Factor(2020). https://community.arm.com/developer/ip-products/processors/b/processors-ip-blog/posts/history-of-the-mobile-form-factor (accessed February 20, 2021).
|
11 |
J. Bonneau, S. Preibusch, and R. Anderson, "A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs," Proceeding of International Conference on Financial Cryptography and Data Security, pp. 25-40, 2012.
|
12 |
Samsung picks in-folding type for foldable smartphone(2017). http://www.theinvestor.co.kr/view.php?ud=20170928000900 (accessed February 20, 2021).
|
13 |
M. Shahzad, A. X. Liu, and A. Samuel, "Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it," Proceeding of the 19th Annual International Conference on Mobile Computing & Networking, pp. 39, 2013.
|
14 |
I. Kim, "Keypad against Brute Force Attacks on Smartphones," IET Information Security, Vol. 6, No. 2, pp. 71-76, 2012.
DOI
|
15 |
A.K. Kyaw, F. Sioquim, and J. Joseph, "Dictionary Attack on Wordpress: Security and Forensic Analysis," Proceedings of the 2nd International Conference on Information Security and Cyber Forensics, pp. 158-164, 2015.
|
16 |
Social Engineering Attacks: Common Techniques & How to Prevent an Attack(2020). https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack (accessed February 20, 2021).
|
17 |
E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R.R. Choudhury, "TapPrints: Your Finger Taps Have Fingerprints," Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323-336, 2012.
|
18 |
X. Su ,Z. Wang, X. Liu, C. Choi, and D. Choi, "Study to Improve Security for IoT Smart Device Controller: Drawbacks and Counter-measures," Security and Communication Networks, Vol. 2018, No. 4296934, pp. 1-14, 2018.
|
19 |
H. Kim, H. Seo, Y. Lee, T. Park, and H. Kim, "Implementation of Secure Virtual Financial Keypad for Shoulder Surfing Attack," Korea Institute of Information Security and Cryptography, Vol. 23, No. 6, pp. 21-29, 2013.
|
20 |
T. Takada, "Fake Pointer: An Authentication Scheme for Improving Security against Peeping Attacks using Video Cameras," Proceeding of International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 395-400, 2008.
|
21 |
FLIR ONE PRO LT(2020). https://www.flirkorea.com/products/flir-one-pro-lt/ (accessed February 20, 2021).
|
22 |
A.J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J.M. Smith, "Smudge Attacks on Smartphone Touch Screens," Proceeding of USENIX Conference on Offensive Technologies, pp. 1-7, 2010.
|
23 |
Y. Abdelrahman, M. Khamis, S. Schneegass, and F. Alt, "Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication," Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3751-3763, 2017.
|
24 |
Integrated thermal imaging(2019). https://www.catphones.com/en-dk/features/integrated-thermal-imaging/ (accessed February 19, 2021).
|
25 |
D. Choi, "Indirect PIN Entry Method for Mobile Banking Using Relative Location Information of Secret Code," Journal of Korea Multimedia Society, Vol. 23, No. 6, pp. 738-746, 2020.
|