Acknowledgement
Supported by : 한국연구재단
References
- Reuters, [Online]. Available: http://www.reuters.com/article/2014/02/04/us-usa-obama-education-idUSBREA130J520140204. 2014.
- USA Today, [Online]. Available: http://www.usatoday.com/story/tech/personal/2013/08/07/views-shift-on-cell-phones-in-schools/2607381. 2014.
- IBM Data Center, [Online]. Available: http://www-935.ibm.com/services/us/en/outsourcing/data-center-outsourcing. 2014.
- utopia, [Online]. Available: http://www.utopiainc.com. 2014.
- NTTDATA, [Online]. Available: http://americas.nttdata.com. 2014.
- C. James, [Online]. Available: http://www.businessinsider.com/how-hackers-get-into-your-apple-icloud-account-2014-9. 2014.
- RSA SecureID, [Online]. Available: http://www.emc.com/security/rsa-securid.htm. Accssed 7 Dec. 2014.
- F. Stajano, Pico: No more passwords!. In Security Protocols XIX, Springer Berlin Heidelberg, pp. 49-81, 2011.
- S. Drimer, J. Murdoch, R. Anderson, Optimised to Fail: Card Readers for Online Banking, Financial Cryptography and Data Security, pp. 184-200, 2009.
- J. Yuan, S. Yu, Efficient privacy-preserving biometric identification in cloud computing, Proc. of IEEE INFOCOM, pp. 2752-2760, 2013.
- D. Evans, Y. Huang, J. Katz, L. Malka, Efficient privacy-reserving biometric identification, NDSS, pp. 2653-2657, 2011.
- M. Barni, T. Bianchi, D. Catalano, M. Raimondo, R. Donida, P. Failla, A. Piva, Privacy-preserving Fingercode authentication, MMSec', Roma, Italy, ACM, pp. 2-7, 2012.
- Core Concepts - Authentication, [Online]. Available: https://developers.facebook.com/docs/authentication. 2014.
- D. Recordon and B. Fitzpatrick, [Online]. Available: http://openid.net/specs/openid-authentication-1\_1.html. 2014.
- OpenID Connect, [Online]. Available: http://openid.net/connect. 2014.
- S. Wiedenbeck, J. Waters, C. Birget, A. Brodskiy, N. Memon, PassPoints: Design and longitudinal evaluation of a graphical password system, International Journal of Human-Computer Studies 63.1, pp. 102-127, 2005. https://doi.org/10.1016/j.ijhcs.2005.04.010
- S. Chiasson, C. Oorschot, R. Biddle, Graphical Password Authentication Using Cued Click Points, Proc. European Symp. Research in Computer Security (ESORICS), pp. 359-374, 2007.
- S. Chiasson, E. Stobert, A. Forget, R. Biddle, C. Oorschot, Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism, IEEE Trans. on Dependable and Secure Computing, Vol. 9, No. 2, pp. 222-235, 2012. https://doi.org/10.1109/TDSC.2011.55
- Google Inc., [Online]. Available: https://www.google.com/landing/2step. 2014.
- A. Czeskis, M. Dietz, T. Kohno, D. Wallach, D. Balfanz, Strengthening user authentication through opportunistic cryptographic identity assertions, Proc. of the 2012 ACM conference on Computer and communications security, pp. 404-414, 2012.
- R. Morris, K. Thompson, Password security: a case history. Commun. ACM, Vol. 22, No. 11, pp. 594-597, 1979. https://doi.org/10.1145/359168.359172
- A. Adams, M. Sasse, Users Are Not The Enemy. Commun. ACM, Vol. 42, No. 12, pp. 41-46, 1999.
- K. Jain, S. Prabhakar, L. Hong, S. Pankanti, Filterbank- based fingerprint matching, Image Processing, IEEE Transactions on 9.5, pp. 846-859, 2000.
- K. Golofit, Click passwords under investigation. Computer Security-ESORICS, Springer Berlin Heidelberg, pp. 343-358, 2007.
- A. Dirik, Modeling user choice in the PassPoints graphical password scheme, Proc. of the 3rd symposium on Usable privacy and security. ACM, pp. 20-28, 2007.
- J. Thorpe, C. Oorschot, Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords, Proc. 16th USENIX Security Symp., pp. 103-118, 2007.
- A. Salehi-Abari, J. Thorpe, C. Oorschot, On Purely Automated Attacks and Click-Based Graphical Passwords, Proc. Ann. Computer Security Applications Conf. (ACSAC), pp. 111-120, 2008.
- S. Halevi, D. Harnik, B. Pinkas, A. Shulman-Peleg, Proofs of ownership in remote storage systems, Proc. of the 18th ACM conference on Computer and communications security. ACM, pp. 491-500, 2011.
- G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, ACM CCS '07, pp. 598-609, 2007.