References
- J. Yoo, J. Ko, S. Jung, Y. Chung, K. Kim, K. Moon, and K. Chung, "Design of an Embedded Multimodal Biometric System," Electronics and Telecommunications Research Institute-Information Security Research Division, Dec, 2007, pp. 988-992.
- S. Yoon and G. Kim, "Personal Biometric Identification based on ECG Features," J. of the Korea Institute of Communication and Information Sciences, vol. 10, no. 4, 2015, pp. 521-526.
- L. Lamport, "Password Authentication with Insecure Communication," Communication of the ACM, vol. 24, no. 11, Nov, 1981, pp. 770-772. https://doi.org/10.1145/358790.358797
- N. Haller, C. Metz, P. Nesser, and M. Straw, "A One-Time Password System," RFC 2289, Bellcore, Kaman Sciences Corporation, Nesser and Nesser Consulting, Feb, 1998, pp. 1-25.
- C. Mitchell, "Remote user authentication using public information," 9th Institute of Mathematics and Application Conf. on Cryptography and Coding, Lecture Notes in Computer Science 2898, Berlin, Heidelberg, Dec, 2003, pp. 360-369.
- H. Chien and J. Jan, "Robust and Simple Authentication Protocol," Oxford J., The Computer J., vol. 46, no. 2, 2003. pp. 1-9. https://doi.org/10.1093/comjnl/46.1.1
- J. Soo and K. Park, "An Efficient data management Scheme for Hierarchical Multi-processing using Double Hash Chain," Digital Fusion Research, vol. 13, no. 10, 2015, pp. 271-278.
- H. Park and J. Seo, "Implementation of Mobile Authentication System for Context-Awareness based on Near Field Communication," J. of the Korea Institute of Communication and Information Sciences, vol. 12, no. 1, 2017, pp. 39-45.
- G. Montenegro and C. Castelluccia. "Crypto-based identifiers (CBIDs): Concepts and applications," ACM Trans. Information and System Security, vol. 7, no. 1, 2004, pp. 97-127. https://doi.org/10.1145/984334.984338
- E. Blass, O. Elkhiyaoui, K. Molva, and R. "Tracker: security and privacy for RFID based supply chains," In Proc. the 18th Network and Distributed System Security Symp., San Diego, California, Feb, 2011.
- V. Griffith, M. Jokobsson, and Messin, "Deriving mother's maiden names using public records," Applied Cryptography and Network Security (ACNS), Springer, Heidelberg, vol. Lecture Notes in Computer Science 3531, 2005, pp. 91-103.
- D. Klien, "A survey of and improvements to password security," UNIX Security II: USENIX Workshop Proc., Portland, Oregon, Aug, 1990.
- W. Jeong and S. Lee, "A Study on the Self-Key Generation Algorithm for Security Elevation in Near Field Communications," J. of the Korea Institute of Communication and Information Sciences, vol. 7, no. 5, 2012, pp. 1027-1032.