User Integrated Authentication System using EID in Blockchain Environment |
Kim, Jai-Yong
(Dept. of Computer Science, Soong-Sil University)
Jung, Yong-Hoon (UniHubLAB) Jun, Moon-Seog (Dept. of Computer Science, Soong-Sil University) Lee, Sang-Beon (UniHubLAB) |
1 | H. Kim, I. Lee, "A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack", Jr. of the Korea Institute of Information Security & Cryptology, Vol.24, No.5, pp.769-780, 2014. DOI: https://doi.org/10.13089/JKIISC.2014.24.5.769 |
2 | Security Technology Research Team, Comparison of Changes and Characteristics of Identity Information Management Types, Security Research Department, Financial Security Agency, Korea, pp.1-6, 2017. |
3 | BSI, Common Criteria Protection Profile-Machine Readable Travel Document with ICAO Application, Extended Access Control with PACE(EAC pp), BSI-PP-0017, Version1.3.0, 20th January 2012. |
4 | Gaurav S.,Kcand Paul A.,Karger, Security and privacy issues in machine readable travel documents(MRTDs), IBM Technical Report(RC 23575), IBM T.J, Watson Research Labs, Apr 2005. |
5 | BSI, Advanced Security Mechanisms Machine Readable Travel Documents - Extended Access Control(EAC), Version 2.05, TR-03110, 2010. |
6 | NIST. "FIPS Publication186-1:Digital Signature Standard(DS-S)", November 2008. |
7 | G. W. Kuk, Application Cases by Blockchain Technology and Industry Sectors, Weekly ICT Trends, Institute of Information & Communications Technology Planning & Evaluation, Vol.1900, pp.13-27, 2019. |
8 | Y. J. Lee, Taeyeol Jeon.. "An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server", Journal of the Korea Academia-Industrial, Vol.20, No.6, pp.1-8. 2019. DOI: https://doi.org/10.5762/KAIS.2019.20.6.1 |
9 | J. H. Jang, S. H. Song, S. T. Kim, "A Survey on Blockchain Platforms for Supply Chain Management", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.18, No.5, pp.259-265, 2019. DOI: https://doi.org/10.7236/JIIBC.2018.18.5.259 DOI |
10 | J. C. Park, "A Secure Single Sign-On Scheme across Multiple Allied Websites using Smartphones". Journal of Security Engineering, Vol.14, No.3, pp. 189-204, 2017. DOI: http://dx.doi.org/10.14257/jse.2017.06.01 DOI |
11 | Y. Choi, H. Kwon, "A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information", Journal of the Korea Institute of Information Security & Cryptology, Vol.28, No.6, pp.1607-1621, 2018. DOI: https://doi.org/10.13089/JKIISC.2018.28.6.1607 DOI |
12 | S. J. Han, S. T. Kim, S. Y. park, "A GDPR based Approach to Enhancing Blockchain Privacy", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.19, No.5, pp.33-38, 2019. DOI: https://doi.org/10.7236/JIIBC.2019.19.5.33 |
13 | S. G. Moon, M. S. Kim, H. J. Kim, "Design of an Integrated University Information Service Model Based on Block Chain", Journal of the Korea Academia-Industrial cooperation Society Vol. 20, No. 2 pp. 43-50, 2019. DOI: https://doi.org/10.5762/KAIS.2019.20.2.43 DOI |
14 | M. J. Cho, C. H. Lee, "Access Control Mechanism for Industrial Control System Based Smart Contract", Journal of The Korea Institute of Information Securty & Cryptology, Vol.29, No.3, pp.579-588, 2019. DOI: https://doi.org/10.13089/JKIISC.2019.29.3.579 |
15 | S. D. Yoo, "A Study on Consensus Algorithm based on Blockchain", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.19, No.3, pp.25-32, 2019. DOI: https://doi.org/10.7236/JIIBC.2019.19.3.25 DOI |
16 | J. K. Lee, J. G. Son, H. M. Kim, H. K. Oh, "An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment", Journal of The Korea Institute of Information Security & Cryptology, Vol.23, No.6, pp.1131-1141, Dec 2013. DOI: https://doi.org/10.13089/JKIISC.2013.23.6.1131 DOI |