참고문헌
- National Cyber Security Center, "The problems with forcing regular password expiry," https://www.ncsc.gov.uk/articles/problems-forcing-regularpassword-expiry, 2016
- 김수형, "FIDO 기반 핀테크 인증 기술," 한국통신학회, 한국통신학회지(정보와통신) 33(2), 2016.1, 59-65 (7 pages)
- 김수형 외, " 핀테크 시대: 새로운 인증 기술을 요구하다," 정보과학회지 제33권 제5호, 2015.5, 17-22.
- 조상래 외, " FIDO 2.0 범용인증기술 소개," 정보보호학회지 제26권 제2호, 2016.4, 14-19.
- GAINES, R. Stockton, et al. Authentication by keystroke timing: Some preliminary results. RAND CORP SANTA MONICA CA, 1980.
- ALAN S. NEAL, Time Intervals between Keystrokes, Records, and Fields in Data Entry with Skilled Operators . HUMAN FACTORS, 19(2), pages 163-170. 1977. https://doi.org/10.1177/001872087701900206
- Sung-Hoon Lee, Jong-hyck Roh, Soohyung Kim, Seung-Hun Jin, A study on feature of keystroke dynamics for improving accuracy in mobile environment, 17th WISA, August, 2016.
- A. Buchoux and N.L. Clarke. Deployment of keystroke analysis on a smartphone. In Australian Information Security Management Conference, 2008. p.48.
- H. Saevanee and P. Bhatarakosol. User authentication using combitnation of behavioral biometrics over the touchpad acting like touch screen of mobile device. In International Conference on Computer and Electrical Engineering (ICCEE), pages 82-86, 2008.
- N. Zheng, K. Bai, H. Huang, and H. Wang. You are how you touch: user verification on smartphones via tapping behaviour. IEEE 22nd International Conference on Network Protocols. pages 221-232. 2014.
- Jong-hyuk Roh, Sung-Hun Lee, and Soohyung Kim. "Keystroke dynamics for authentication in smartphone." Information and Communication Technology Convergence (ICTC), 2016 International Conference on. IEEE, 2016.
- Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith, "It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception," SOUPS 2014, pp. 213-230, Menlo Park, CA, July, 2014.
- Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, and N. Asokan, "ConXsense - Context Profiling and Classification for Context- Aware Access Control," ASIACCS 2014, Kyoto, Japan, June, 2014.
- Aditi Gupta, Markus Miettinen, N. Asokan and Marcin Nagy, "Intuitive Security Policy Configuration in Mobile Devices using Context Profiling," SocialCom 2012, pp. 471-480, Jan. 2013.
- Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason Hong, and Ian Oakely, "CASA: Context-Aware Scalable Authentication," SOUPS 2013, pp. 1-10, Newcastle, UK, July, 2013.
- Upal Mahbub, Sayantan Sarkar, Vishal M. Patel, and Rama Chellappa, "Active User Authentication for Smartphone: A Challenge Data Set and Benchmark Results," BTAS 2016, Sept. 2016.
- Upal Mahbub and Rama Chellappa, "PATH: Person Authentication using Trace Histories," UEMCON 2016, New York, USA.
- J. Sander, M. Ester, H.-P. Kriegel, and X. Xu. Density-based clustering in spatial databases: The algorithm gdbscan and its applications. Data Min. Knowl. Discov., 2(2):169-194, June 1998. https://doi.org/10.1023/A:1009745219419
- Youngsam Kim and Soohyung Kim, "Rethinking of Feature Selection Method for Room-Level Localization using Public APs," ICACT 2017, Pyeongchang, Korea, Feb. 2017.