1 |
Gaw S., Felten E.W., "Password management strategies for online accounts", Proc Scoups, pp 44-55, 2006.
|
2 |
Bonneau, Preibusch, "The password thicket: Technical and Markey failures in human authentication on the web", Proceedings of WEIS, Boston, MA, USA. 2010.
|
3 |
Y. N. Shin, Y. J. Lee, M. G. Chun, "Biometric Template Security for Personal Information Protection", Journal of Korean Intelligence and Information Systems, Vol.18, No. 4, pp 437-444, 2008.
DOI
|
4 |
Y. N. Shin, M. J. Kwon, Y. J. Lee, J. I. Park, M. G. Chun, "Biometric and Identity Reference Protection", Journal of Korean Intelligence and Information Systems, Vol. 19, No. 2, pp. 160-167, 2009.
DOI
|
5 |
M. K. You, M. J. Kwon, S. H. Lee, M. G. Chun, "Secure Binding of Identity Reference and Biometric Reference", Journal of Korean Intelligence and Information Systems, Vol. 20, No. 5, pp. 610-616, 2010.
DOI
|
6 |
Y. N. Shin, M. G. Chun, "Personal Information Protection for Biometric Verification Based", Journal of Korean Intelligence and Information Systems, Vol. 20, No. 5, pp. 659-664, 2010.
DOI
ScienceOn
|
7 |
J. M. Seung, B. N. Noh, S. H. Ahn, "A damage trend and responses to cope with the latest principal hacking", Korea Institute of Information Security & Cryptology, Vol 16, No. 1, pp. 80-83, 2006.
|
8 |
Harreld, H., "Security: an uneasy alliance", Infoworld 23, pp. 42-44, 2001.
|
9 |
Shay R., Komanduri S., Kelley P.G., Bauer L, Leon P.G., Christin N., Mazur M.L., Cranor L.F.,"Encountering Stronger Password Requirements: User Attitudes and Behaviors", Symposium on Usable Privacy and Security(SOUPS), July 14-16 Remond, WA, USA. 2010.
|
10 |
Beate G., Hilary J., "Using and Managing Multiple Passwords : A Week to a View", Interacting with Computers, 23, pp. 256-267, 2011.
DOI
|
11 |
Zviran, M., Haga, W.J., "Password security: an empirical study", Journal of Management Information Systems Vol 15, No. 4, pp. 161-185, 1999.
DOI
|
12 |
Brown, A.S., Brackener, Pro,E., Zoccoli S., and Douglas, K., "Generating and Remembering Passwords", Applied Cognitive Psychology, Vol. 18, pp. 641-651, 2004.
DOI
|
13 |
Dhamija. R., Perrig, A., "A user study: Using images for authentication", Proceedings of the 9th USENIX Security Symposium, August, 2000.
|
14 |
S. K. Moon, "An Empirical study on the analysis of the re-using of four-digit personal identification numbers -A university case", Journal of Digital Policy & Management, Vol 11, No. 10, pp. 737-746, 2013.
|
15 |
S. K. Moon, "A study on the using pattern analysis of four-digit personal identification numbers -A university case", Journal of Digital Policy & Management, Vol 10, No. 10, pp. 529-538, 2012.
|
16 |
E. J. Kim, "Comparision study of the culture of digits habit between korean and Chinese", Journal of Jejoo-Hanra University, Vol 34, 2010.
|
17 |
D. Amitay, "Most Common iPhone Passcodes", Available : http://amitay.us/blog/files/most_common_iphone_passcodes.php, 2011, [Accessed : March 15, 2015]
|