1 |
T. H. Park, G. R. Lee & H. W. Kim. (2017). Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment, Journal of the Korea Institute of Information Security & Cryptology, 27(5), 1149-1155. DOI : 10.13089/JKIISC.2017.27.5.1149
DOI
|
2 |
Y. Ko, J. Choi & B. Kim. (2012). Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center, Journal of the Korea Institute of Information Security & Cryptology, 22(2), 391-400.
|
3 |
T. Y. Kim, H. J. Jun & T. S. Kim. (2018). An Analysis on Intention to Use Information Service for Personal Information Breach, Journal of the Korea Institute of Information Security & Cryptology, 28(1), 199-213.
DOI
|
4 |
H. J. Mum, (2018). Biometric Information and OTP based on Authentication Mechanism using Blockchain, Journal of Convergence for Information Technology, 8(3), 85-90.
DOI
|
5 |
S. H. Lee, (2014). User Authentication Using Biometrics and OTP in Mobile Device, Journal of Convergence for Information Technology, 4(3), 27-31.
|
6 |
S. S. Ji, (2012). The Improved-Scheme of Two Factor Authentication using SMS, Journal of the Korea Industrial Information Systems Research, 17(6), 25-30. DOI : 10.9723/jksiis.2012.17.6.025
DOI
|
7 |
Google. (2018). Google Cloud Vision API. Google Cloud Vision(Online). https://cloud.google.com/vision
|
8 |
S. J. Kim & S. S. Yeo, (2013). A Study on Secure Data Access Control in Mobile Cloud Environment, Journal of Digital Convergence, 11(2), 317-322.
DOI
|
9 |
H. T. Chae & S. J. Lee, (2014). Security Policy Proposals through PC Security Solution Log Analysis - Prevention Leakage of Personal Information, Journal of the Korea Institute of Information Security & Cryptology, 24(5), 961-968. DOI : 10.13089/JKIISC.2014.24.5.961
DOI
|
10 |
S. Khandelwal. (2016). QRLJacking - Hacking Technique to Hijack QR Code Based Quick Login System. The Hacker New(Online). https://thehackernews.com/2016/07/qrljacking-hackingqr-code.html
|
11 |
Y. J. Shin, S. H. Shin, J. S. Lee & W. G. Han, (2015). A Study on Improvement of Identification Means in R.O.K, Journal of Korean Associastion for Regional Information Society, 18(4), 59-88.
|
12 |
D. J. Kim & H. S. Choi, (2009). Design on Protection and Authentication System of IPTV Contents using OTP, Journal of The Korea Ccontens Association, 9(8), 129-137. DOI : 10.5392/JKCA.2009.9.8.129
DOI
|
13 |
H. Ketabdar, K. A. Yuksel, A. Jahnbekarn, M. Roshandel & D. Skirop, (2010). MagiSign: User Identification /Authentication Based on 3D Around Device Magnetic Signatures, Proc. Of UBICOMM'10, 31-34.
|
14 |
C. J. Chae, H. J. Cho & H. M. Jung, (2018). Authentication Method using Multiple Biometric Information in FIDO Environment, Journal of Digital Convergence, 16(1), 159-164.
DOI
|
15 |
J. S. Seo & J. S. Moon, (2015). A Study on User Authentication with Smartphone Accelerometer Sensor, Journal of The Korea Institute of Information Security and Cryptology, 25(6), 1477-1484. DOI : 10.13089/JKIISC.2015.25.6.1477
DOI
|