1 |
J. W. Jung, J. D. Kim, M. G. Song & C. G. Jin. (2015). A study on Development of Certification Schemes for Cloud Security, The Journal of digital policy & management, 13(8), 43-49. DOI: 10.14400/JDC.2015.13.8.43
|
2 |
S. H. Hong. (2012). New Authentication Methods based on User's Behavior Big Data Analysis on Cloud, Journal of Convergence for Information Technology, 2(2), 35-41. DOI: 10.22156/CS4SMB.2016.6.4.031
DOI
|
3 |
M. K. Choi, T. C. Kwan & D. H. Lee. (2013). Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone, Journal of The Korea Institute of Information Security and Cryptology, 23(1), 19-32. DOI: 10.13089/jkiisc.2013.23.1.019
DOI
|
4 |
S. J. Kim. (2010). Information Security Plan on Cloud Computing - Information Security Management System, Korean Review of Management Consulting, 1(2), 194- 208.
|
5 |
H. T. Chae & S. J. Lee. (2014). Security Policy Proposals through PC Security Solution Log Analysis - Prevention Leakage of Personal Information, Journal of the Korea Institute of Information Security & Cryptology, 24(5), 961-968. DOI: 10.13089/jkiisc.2014.24.5.961
DOI
|
6 |
D. R. Kim. (2015). A Study on the OTP Generation Algorithm for User Authentication, The Journal of digital policy & management, 13(1), 283-288. DOI: 10.14400/JDC.2015.13.1.283
|
7 |
S. H. Lee. (2014). User Authentication Using Biometrics and OTP in Mobile Device, Journal of Convergence for Information Technology, 4(3), 85-90.
|
8 |
T. K. Lee, Y. H. Kim & E. G. Im. (2017). Biometric User Authentication Method of Mobile Appilication in Trustable Space, Journal of The Korea Institute of Information Security and Cryptology, 27(2), 201-212. DOI: 10.13089/jkiisc.2017.27.2.201
DOI
|
9 |
J. S. Kim, S. J. Lee, B. S. Kim & S. W. Lee. (2015). Standardization trend of non-face authentication technology based on telebio recognition, Journal of The Korea Institute of Information Security and Cryptology, 25(4), 43-50.
|
10 |
Y. J. Lee, Y. E. Ku & T. K. Kwon. (2019). A Study of User Perception on Features Used in Behavior-Based Authentication, Journal of the Korea Institute of Information Security & Cryptology, 29(1), 127-137.
DOI
|
11 |
Raspberry Pi Foundation. (2019). Raspberry Pi. Raspberry Pi [Online]. https://www.raspberrypi.org
|
12 |
Y. J. Shin. (2017). A Study on the Personal Information Protection for Improvement of Personal Identification - Focusing on the Alternative Means of Resident Number for Users, Journal of Korean Associastion for Regional Information Society, 20(2), 1-24.
|
13 |
S. H. Yun. (2016). The Biometric Authentication based Dynamic Group Signature Scheme, Journal of the Korea Convergence Society, 7(1), 49-55. DOI: 10.15207/jkcs.2016.7.1.049
DOI
|
14 |
M. G. Lee, Do. W. Kim & J. S. Shon. (2012). Active Authentication Method using NFC, The Journal of Korean Institute of Communications and Information Sciences, 37(2), 140-156.
DOI
|
15 |
C. O. Kang, J. J. Won, S. J. Park & J. C. Ryou. (2013). Efficient File System Level Encryption Mechanism Using HSM, Journal of the Korea Institute of Information Security and Cryptology, 23(5), 849-858. DOI: 10.13089/jkiisc.2013.23.5.849
DOI
|
16 |
S. Balaban. (2015). Deep learning and face recognition: the state of the art, Biometric and Surveillance Technology for Human and Activity Identification XII, 1-9 DOI: 10.1117/12.2181526
|