1 |
M. Stamp, Information Security: Principles and Practice 2nd Edition, Wiley-Inerscience, 2011.
|
2 |
Tepandi, "Wireless PKI Security and Mobile Voting", IEEE Computer, Vol. 43, No. 6, pp. 54-60, 2010.
|
3 |
S. H. Yun, "The Biometric based Mobile ID and Its Application to Electronic Voting", KSII Transactions on Internet and Information Systems, Vol. 7, No. 1, pp. 166-183, 2013.
DOI
|
4 |
P. Janbandhu, M. Siyal, "Novel biometric digital signatures for Internet-based applications", Information Management & Computer Security, Vol. 9, No. 5, pp. 205-212, 2001.
DOI
|
5 |
N. K. Ratha, J. H. Connell, R. M. Bolle, "Enhancing security and privacy in biometric-based authentication systems", IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001.
DOI
|
6 |
ITU-T X.1088, A Framework for biometric digital key generation, ITU-T, 2008.
|
7 |
Apple Support, Ues Touch ID on iPhone and iPad, http://support.apple.com/kb/HT5883.
|
8 |
C. Vivaracho-Pascual, J. Pascual-Gaspar, "On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services", IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 1-10, 2011.
|
9 |
H. Li, K. Toh, L. Li, Advanced Topics in Biometrics, World Scientific, 2011.
|
10 |
L. Harn, "(t,n) Threshold Signature and Digital Multisignature", Workshop on Cryptography & Data Security, pp. 61-73, 1993.
|
11 |
S. H. Yun, "The USIM based Biometric Multi-Signature for Mobile Content Authentication", ICONI, pp. 137-141, 2011.
|
12 |
W. Diffie, M. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, 1976.
DOI
|
13 |
D. M. Burton, Elementary Number Theory, McGraw-Hill, 2010.
|
14 |
T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.
DOI
|
15 |
D. Chaum, "Undeniable Signatures", Advances in Cryptology, Proceedings of CRYPTO'89, Springer-Verlag, pp. 212-216, 1990.
|
16 |
D. R. Kim, "A Study on the OTP Generation Algorithm for User Authentication", Journal of Digital Convergence, Vol. 13, No. 1, pp. 283-288, 2015.
DOI
|
17 |
Y. J. Song, S. M. Gu, Y. C. Kim, "A Study on the Distributed Transcoding System using Secret Sharing Techniques", Journal of Digital Convergence, Vol. 12, No. 11, pp. 233-239, 2014.
DOI
|
18 |
S. H. Hong, "Vulnerability of Directory List and Countermeasures", Journal of Digital Convergence, Vol. 12, No. 10, pp. 259-264, 2014.
DOI
|
19 |
H. M. Choi, C. B. Jang, J. M. Kim, "Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM", Journal of Digital Convergence, Vol. 12, No. 10, pp. 299-308, 2014.
|
20 |
S. Y. Lee, S. S. Yeo, "Efficient Secret Sharing Data Management Scheme for Privacy Protection in Smart Grid Environment", Journal of Digital Convergence, Vol. 11, No. 12, pp. 311-318, 2013.
DOI
|