1 |
지선수, 이희춘, "최종 승인시간을 이용하는 개선된 패스워드 기법", 한국산업정보학회논문지, 제16 권, 제3호, pp. 57-63, 2011.
과학기술학회마을
DOI
|
2 |
한국 IBM, X-Force 2011년 중반기 보안 동향 및 리스크 보고서, 2011. 10. 5.
|
3 |
D. A. Marra, "A Strong Authentication Mechanism for Consumer-Facing Online Transactions", MIT, Department of EECS Chisec Group, 2005.
|
4 |
GPayments Pty Limited, Two-Factor Authentication : An essential guide in the fight against Internet fraud [Online] Available www.gpayments.com/, GPayments White Paper, February 2006.
|
5 |
H. Gao, Z. Ren, X. Chang, X. Liu, and U. Aickelin, "A New Graphical Password Scheme Resistant to Shoulder-Surfing", Paper presented at the 2010 International Conference on CyberWorlds, Singapore, October 2010.
|
6 |
V. K. Katankar and V. M. Thakre, "Short Message Service using SMS Gateway", IJCSE, Vol. 2, No. 4, 2010.
|
7 |
F. Aloul, S. Zahidi and W. El-Hajj, "Multi Factor Authentication Using Mobile Phones", International Journal of Mathematics and Computer Science, Vol. 4 , No. 2, pp. 65-80, 2009.
|
8 |
A. Heathcote, S. J. Popiel and D. J. K. Mewhort, "Analysis of Response Time Distributions: An Example Using the Stroop Task", Psychological Bulletin, Vol. 109, Issue 2, pp. 340-347, 1991.
DOI
|