References
- Woonho Jung, "A Trends of Mobile payments and alternative authentication certificate," http://www.t-town.co.kr:8080/images/Event/2014tech/5_tmonet_mobilepay.pdf, LG CNS, 14th, May, 2014.
- Seungjin Han, A Financial Security using Mobile Biometrics Application and Technology, Technical Report, KISA, March, 2014.
- Seungjin Han, "A Framework for Biometric Security based on OTP in Mobile Devices," Journal of The Korea Society of Computer and Information, Vol. 17, No. 4, pp. 121-127, Apr. 2012. https://doi.org/10.9708/jksci.2012.17.4.121
- M. Gordon and S. Sankaeanaeayanan, "Biometric Security Mechanism in Mobile Payments", Proc., of the 5th National Conference; INDIACom-2011, Computing For Nation Development, March 10-11, 2011.
- Bao, X, Wang, J. and Hu, J, "Method of Individual Identification based on Electroencephalogram Analysis", Proc., of 2009 International Conference on New Trends in Information and Service Science, pp. 390-393, Beijing, P.R.China, June 9-July 2, 2009.
- Nakanishi, I, Baba, S and Miyamoto, C, "EEG Based Biometric Authentication Using New Spectral Features", Proc., of 2009 International Symposium on Intelligent Signal Processing and Communication Systems, pp. 651-654, Kanazawa, Ishikawa, Japan, December 7-9, 2009.
- http://www.huffingtonpost.com/2011/10/19/face-unlock-ice-cream-sandwich_n_1020207.html
- Daugman, J, "How Iris Recognition Works", IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, Jan., 2004. https://doi.org/10.1109/TCSVT.2003.818350
- ITU-T, "A Guideline to Technical and Operational Countermeasures for Telebiometric Applications using Mobile Devices," Comm. 3rd Draft Recommendation ITU-T X.1087(X.tam)
- Namho, Kim, A Study on the Mobile OTP Key Creation Method using Biometrics Information, Doctoral dissertation, Computer science and Statistics of Chonnam Univ., Feb., 2013.
- Lin You, et. al., "Signature Systems on Smart Card with Keys Generated by Fingerprint," pp. 675-679, ICACT2006, Feb. 20-22, 2006.
- Chin-Ling Chen, Jinn-Ke Jan, and Chih-Feng Chien, "Using Mobile Device to Design A Secure Transaction," 2010 International Conference on Complex, Intelligent and Software Intensive Systems, IEEE, Krakow, 15-18 Feb. 2010.
- Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer and Stephane Tinguely, "Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards", Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002.
- W. Diffie and M. Hellman, "New Directions on Cryptography," IEEE Transactions on Information Theory, IT-22(6): pp. 644-654, Nov., 1976.
- Y. Zheng, D. K. He, X. H. Tang and, H. X. Wang, "AKA and Authtentication Scheme for 4G Mobile Networks Based on Trusted Mobile Platform", ICICS 2005, pp. 976-980, 2005.
- 3GPP TS 24.002, Release 4. GSM-UMTS public land mobile network access reference configuration, June, 2003.
- Jian Wang, Nan Jiang, "Secure Authentication and Authorization Scheme for Mobile Devices," Proceedings of ICCTA2009, 2009.