1 |
W. M, Sim, "Issues and Alternatives on Internet Identification: Analysis on the Basis of Architectural Regulation Theory", Korean Journal of Law & Society, Vol. 47, pp. 209-237, 2014. UCI: G704-001292.2014..47.004
|
2 |
H. K, Choi, H. R. Kim, "Design and Implementation of a Malicious SMS Training System for Preventing Smishing", The Journal of KIIT., Vol. 17, No. 10, pp. 93-99, 2019. DOI: https://doi.org/10.14801/jkiit.2019.17.10.93
|
3 |
J. K. Park,,"A Study of Realtime Malware URL Detection & Prevention in Mobile Environment", Journal of the Korea Society of Computer and Information, Vol. 20, No. 6, pp. 37-42, 2015.
DOI
|
4 |
G. W, Seo, L. Y. Moon,, "A Study of Technical Countermeasure System for the Smishing Detection and Prevention Based on the Android Platform", Journal of Advanced Navigation Technology, Vol. 18, No. 6, pp. 569-575, 2014. DOI: https://doi.org/10.12673/jant.2014.18.6.569
DOI
|
5 |
S. H. Song, S. T. Kim, J. H. Shin, J. H. Lee, "Recovery Phrase Management Scheme for Public Blockchain Wallets based on OTP", The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 20, No. 1, pp. 35-44, 2020. DOI: https://doi.org/10.7236/JIIBC.2020.20.1.35
DOI
|
6 |
S. H. Kim, Y. G. Kim, "A Study on the Blockchain-based System Authentication Method", The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 20, No. 1, pp. 211-218, 2020. DOI: https://doi.org/10.7236/JIIBC.2020.20.1.211
DOI
|
7 |
S. J. Nam, S. T. Kim, J. H. Shin, "Context-Aware Mobile User Authentication Approach using LSTM networks", The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 20, No. 1, pp. 11-18, 2020. DOI: https://doi.org/10.7236/JIIBC.2020.20.1.11
DOI
|
8 |
H. I. Choi, I. U. Song, "The Mediating Effect of Self-efficacy between the Elderly's Digital Information Literacy and Life Satisfaction", Journal of the Korea Academia-Industrial cooperation Society, Vol. 21, No. 6, pp. 246-255, 2020. DOI: http://dx.doi.org/10.5762/KAIS.2020.21.6.246
DOI
|
9 |
ICT regulation sandbox, https://www.sandbox.or.kr/
|
10 |
Internet World Stats (2020.07.20.) https://internetworldstats.com/asia.htm#kr
|
11 |
J. B. Kim, "A Study on Improvement of Personal Identity Proofing Service(PIPS) Based on Alternative Methods of Resident Registration Number", Journal of The Korea Society of Digital Industry and Information Management, Vol. 15, No. 2, pp. 29-42, 2019. DOI: https://doi.org/10.17662/ksdim.2019.15.2.029
DOI
|
12 |
H. K, Lee, "The Problems and Reformation of the Personal Identification by the Resident Registration Number on the Internet", Hanyang Law Association, Vol. 23-1, No. 37, pp. 341-371, 2012. UCI: G704-001896.2012..37.005
|
13 |
J. B. Kim, "Safety Improvement Methods of Personal Identification Services using the i-Pin", Journal of Information Technology Services, Vol. 16, No 2, pp. 97-110, 2017. DOI: https://doi.org/10.9716/KITS.2017.16.2.097
DOI
|
14 |
L. D. Nhac, N. T. Trang, N.T. Hau, N. H. Nam, G. S. Choi, "Detecting smartphone user habits using sequential pattern analysis", International Journal of Internet, Broadcasting and Communication, Vol, 7, No. 1, pp. 20-22, 2015. DOI: https://doi.org/https://doi.org/10.7236/IJIBC.2015.7.1.20
DOI
|
15 |
Y. J. Shin, J. B. Kim H. Y, Han, Research on alternative means of resident number and research on improvement of certification procedure, KISA, 2015.
|
16 |
J. B. Kim, "A Study on Differentiated Personal Proofing Service Based on Analysis of Personal Identification Requirements in Online Services", Journal of the Institute of Internet, Broadcasting and Communication, Vol. 20, No. 2, pp. 201-208, 2020. DOI: https://doi.org/10.7236/JIIBC.2020.20.2.201
DOI
|
17 |
Y. J. Shin, S. H, Shin, J. S. Lee, W. K. Han, "A Study on Improvement of Identification Means in R.O.K", Journal of The Korean Association for Regional Information, Vol. 18, No. 4, pp. 59-88, 2015. DOI: https://doi.org/10.22896/karis.2015.18.4.003
|
18 |
방송통신위원회, 본인확인기관 지정 등에 관한 기준 고시, http://www.law.go.kr/행정규칙/본인확인기관지정등에관한 기준
|