References
- PEW research center, Spring 2015 Global Attitudes survey. Q71 & Q72, 2016.2
- Riva, O., Qin, C., Strauss, K., & Lymberopoulos, D. (2012). Progressive authentication: deciding when to authenticate on mobile phones. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12) (pp. 301-316)
- David Umphress and Glen Williams. Identity verification through keyboard characteristics. International Journal of Man-Machine Studies, 23(3):263 . 273, 1985. https://doi.org/10.1016/S0020-7373(85)80036-5
- Sungzoon Cho, Chigeun Han, Dae Hee Han, and Hyung il Kim. Web based keystroke dynamics identity verification using neural network. Journal of Organizational Computing and Electronic Commerce, 10:295.307, 2000. https://doi.org/10.1207/S15327744JOCE1004_07
- Dat Tran, Wanli Ma, Girija Chetty, and Dharmendra Sharma. Fuzzy and markov models for keystroke biometrics authentication. In Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization, SMO'07, pages 89.94, Stevens Point, Wisconsin, USA, 2007. World Scientific and Engineering Academy and Society (WSEAS).
- R. Giot, M. El-Abed, and C. Rosenberger. Keystroke dynamics with low constraints svm based passphrase enrollment. In Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on, pages 1.6, Sept 2009.
- Zheng, Nan, et al., You are how you touch: User verification on smartphones via tapping behaviors, Network Protocols (ICNP), 2014 IEEE 22nd International Conference on. IEEE, 2014.
- Maja Pusara and Carla E. Brodley. User re-authentication via mouse movements. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, VizSEC/DMSEC '04, pages 1.8, New York, NY, USA, 2004. ACM.
- Nan Zheng, Aaron Paloski, and Haining Wang. An efficient user verification system via mouse movements. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 139.150, New York, NY, USA, 2011. ACM.
- BehavioSec, BehavioSec participation in the DARPA AA Phase 2 - A case study of Behaviometrics authentication for mobile devices, 2013/2014
- D. Impedovo and G. Pirlo. Automatic signature verification: The state of the art. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 38(5):609. 635, Sept 2008. https://doi.org/10.1109/TSMCC.2008.923866
- C. Gruber, T. Gruber, S. Krinninger, and B. Sick. Online signature verification with support vector machines based on lcss kernel functions. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, 40(4):1088.1100, Aug 2010. https://doi.org/10.1109/TSMCB.2009.2034382
- 머니투데이, BC카드, 손 안대고 결제하는 ZEP 서비스 출시, 2014.12.02.
- CNET Korea, 페이팔, 블루투스 기반 모바일 결제 솔루션 '비콘' 선봬, 2013.09.10.
- 파이낸셜뉴스, 더 가까워진 사물인터넷 '비콘'을 아십니까, 2014.07.30.
- 보안뉴스, 편리와 보안성 다 잡겠다! 야심찬 핀테크 3 종, 2015.3.26.
- 매일경제, 모바일 뱅킹 선점하자 세계 금융 2차산업혁 명중, 2014.11.10.
- 한경비즈니스, 세계 무대에 오픈 국내 핀테크 선두 주자3인장, 2016.2.29.
- 핀테크 센터, 보안과 편리함 모두 잡아라! 스마트사인, 2015.8.12.
- BETANEWS, Identifying users with behavioral biometrics, 2016.2.27.
- TechCrunch, Pre-Crime Startup BioCatch Authenticates Users Via Touch And Your Phone's Accelerometer, 2015.07.07.
- THE WALL STREET JOURNAL, Companies Move Beyond Passwords With Human Behavior Algorithms, 2015.9.28.
- BehavioSec, A case study of Behaviometrics authentication for mobile devices, 2013/2014
- 김상훈, 2015-2017 앞으로 3년 세계 트렌드, 한즈미디어(주)