References
- Shuo Wang and Jing Liu, Shuo Wang and Jing Liu, "Biometrics on Mobile Phone", www.intechopen.com/articles/show/title/biometrics-on-mobile-phone, Source : Recent Application in Biometrics, ISBN : 978-953-307-488-7, July, 2011.
- Tseng, D. et. al., "Lensfree Microscopy on a Cellphone", Lab on a Chip, Vol. 10, No. 14, pp. 1782-1792, July, 2010.
- M. Gordon and S. Sankaeanaeayanan, "Biometric Security Mechanism in Mobile Payments", Proc., of the 5th National Conference; INDIACom-2011, Computing For Nation Development, March 10-11, 2011.
- Bao, X, Wang, J. and Hu, J, "Method of Individual Identification based on Electroencephalogram Analysis", Proc., of 2009 International Conference on New Trends in Information and Service Science, pp. 390-393, Beijing, P.R.China, June 9-July 2, 2009.
- Nakanishi, I, Baba, S and Miyamoto, C, "EEG Based Biometric Authentication Using New Spectral Features", Proc., of 2009 International Symposium on Intelligent Signal Processing and Communication Systems, pp. 651-654, Kanazawa, Ishikawa, Japan, December 7-9, 2009.
- http://www.biometry.com/mobicombiom.html
- http://www.voicevault.com/voicevault-enterprise/voice auth/
- http://www.huffingtonpost.com/2011/10/19/faceunlock-ice-cream-sandwich_n_1020207.html
- Daugman, J, "How Iris Recognition Works", IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, Jan., 2004. https://doi.org/10.1109/TCSVT.2003.818350
- Byung Rae Cha, Nam Ho Kim, Jong Won Kim, "Availability Verification of Integration OTP Framework using Biometrics Information", Journal of The Korea Navigation Institute, Vol. 5, No. 1, Feb., 2011.
- Yun Su Chung, Yongjin Lee, Hyung-Woo Lee, Ki Young Moon, "Biometric Authentication Framework based on One-Time Template", Journal of KIISC, Vol. 18, No. 4, pp.61-65, Aug., 2008.
- Yong-Nyuo Shin, Young-Jin Kim, Myung-Geun Chun, "Operational Management for Biometrics Hardware Security Module and PKI", Journal of KIISC, Vol. 9, No. 5, May, 2011.
- Wenbo Mao, Modern Cryptography : Theory and Practice, Prentice Hall, July, 2003.
- Seungjin Han, "A Robust Pair-wise Key Agreement Scheme based on Multi-hop Clustering Sensor Network Environments", Journal of KSCI, Vol. 16, No. 3, Mar., 2011.
- Jian Wang, Nan Jiang, "Secure Authentication and Authorization Scheme for Mobile Devices," Proceedings of ICCTA2009, 2009.
- Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer and Stephane Tinguely, "Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards", Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002.
- Y. Zheng, D. K. He, X. H. Tang and, H. X. Wang, "AKA and Authtentication Scheme for 4G Mobile Networks Based on Trusted Mobile Platform", ICICS 2005, pp. 976-980, 2005.
- 3GPP TS 24.002, Release 4. GSM-UMTS public land mobile network access reference configuration, June, 2003.
Cited by
- 모바일 환경에서 다중 바이오인식 기반의 금융 거래를 위한 사용자 인증 프레임워크 vol.20, pp.1, 2012, https://doi.org/10.9708/jksci.2015.20.1.143
- 모바일 애플리케이션의 보안성 향상을 위한 App 제어 시스템 설계 및 구현 vol.16, pp.2, 2016, https://doi.org/10.5392/jkca.2016.16.02.243