References
- J. Tepandi, I. Tšahhirov and S. Vassiljev, "Wireless PKI Security and Mobile Voting," IEEE Computer, vol. 43, no. 6, pp. 54-60, June, 2010.
- R. Want, "iPhone: Smarter Than the Average Phone," IEEE Pervasive Computing, vol. 9, no. 3, pp. 6-9, July, 2010.
- C. Vivaracho-Pascual and J. Pascual-Gaspar, "On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 42, no. 2, pp. 213-222, Mar. 2012.
- The 3GPP Project, "Characteristics of the USIM Application," 3GPP TS 31.02, http://www.3gpp. org/ftp/Specs/html-info/31102.htm.
- P. Urien, "Convergent identity: Seamless OPENID services for 3G dongles using SSL enabled USIM smart cards," IEEE CCNC, pp. 830-831, Jan. 2011.
- N. K. Ratha, J. H. Connell and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001. https://doi.org/10.1147/sj.403.0614
- E. Maler and D. Reed, "The Venn of Identity: Options and Issues in Federated Identity Management," IEEE Security & Privacy, vol. 6, no. 2, pp. 16-23, March, 2008.
- D. Evans and N. Paul, "Election Security: Perception and reality," IEEE Security & Privacy, vol. 2, no. 1, pp. 24-31, Jan. 2004. https://doi.org/10.1109/MSECP.2004.1264850
- W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976. https://doi.org/10.1109/TIT.1976.1055638
- T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985.
- D. Chaum and H. Antwerpen, "Undeniable Signatures," Advances in Cryptology, CRYPTO'89, LNCS 435, Springer, pp. 212-216, 1990.
- D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, Vol. 24, No. 2, pp. 84-90, Feb. 1981. https://doi.org/10.1145/358549.358563
- S. H. Yun, "The USIM based Biometric Multi-Signature for Mobile Content Authentication," ICONI 2011, pp. 137-141, 2011.
- B. C. Lee, K. J. Kim, "Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer," ICISC 2002, LNCS 2587, Springer, pp. 389- 406, 2003.
- A. Baraani-Dastjerdi, J. Pieprzyk and R. Safavi-Naini, "A Secure Voting Protocol Using Threshold Schemes," In Proc. of COMPSAC'95, pp. 143-148, 1995.
- P. Horster, M. Michels and H. Petersen, "Blind Multisignature Schemes and Their Relevance for Electronic Voting," In Proc. of COMPSAC'95, pp. 149-155, 1995.
- A. Fujioka, T. Okamoto and K. Ohta, "A practical secret voting scheme for large scale elections," Advances in Cryptology, AUSCRYPT'92, LNCS 718, Springer, pp. 244-251, 1993.
- C. Boyd, "A New Multiple Key Cipher and an Improved Voting Scheme," Advances in Cryptology, EUROCRYPT'89, LNCS 434, Springer, pp. 617-625, 1990.
- S. H. Yun, H. S. Lim, Y. S. Jeong, S. Y. Jung and J. K. Chang, "The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits," Wireless Personal Communications, Springer, vol. 60, no. 3, pp. 405-418, Oct. 2011. https://doi.org/10.1007/s11277-011-0298-3
- A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Designs, Codes and Cryptography, Kluwer, vol. 38, no. 2, pp. 237-257, Feb. 2006. https://doi.org/10.1007/s10623-005-6343-z
- ITU-T X.1088, (2008). A Framework for biometric digital key generation, ITU-T.
Cited by
- 모바일 장치에서 신체정보기반의 효용성 분석을 이용한 인증기법에 관한 연구 vol.11, pp.11, 2013, https://doi.org/10.14400/jdpm.2013.11.11.795
- Analysis of Authentication Methods for Smartphone Banking Service using ANP vol.8, pp.6, 2014, https://doi.org/10.3837/tiis.2014.06.016
- 바이오메트릭 인증 기반의 동적 그룹 서명 기법 vol.7, pp.1, 2016, https://doi.org/10.15207/jkcs.2016.7.1.049