References
- K. Kim, D. Wang, and S. Han, "Home Security System Based on IoT," J. of Korea Institute Electronic Communication Science, vol. 12, no. 1, 2017, pp. 147-154. https://doi.org/10.13067/JKIECS.2017.12.1.147
- S. Agrawal, A. Z. Ansari, and M. S. Umar, "Multimedia Graphical Grid based Text Password Authentication: For Advanced Users," 2016 Thirteenth Int. Conf. on Wireless and Optical Communications Networks (WOCN), Hyderabad, India, Jul. 2016, pp. 1-5.
- D. Tak and D. Choi, "Layered Pattern Authentication Scheme on Smartphone Resistant to Social Engineering Attacks," J. of Korea Multimedia Society, vol. 19, no. 2, 2016, pp. 280-290. https://doi.org/10.9717/kmms.2016.19.2.280
- A. V. D. M. Kayem, "Graphical Passwords - A Discussio," 2016 30th Int. Conf. on Advanced Information Networking and Applications Workshops (WAINA), Crans-Montana, Switzerland, Mar. 2016, pp. 596-600.
- G. Lee, B. Kim, and J. Lee, "Distributed Hardware Security System with Secure Key Update," J. of Korea Institute Electronic Communication Science, vol. 12, no. 4, 2017, pp. 671-678. https://doi.org/10.13067/JKIECS.2017.12.4.671
- J. Saidov, B. Kim, J. Lee and G. Lee, "Hardware Interlocking Security System with Secure Key Update Mechanisms In IoT Environments," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 4, 2017, pp. 671-678 https://doi.org/10.13067/JKIECS.2017.12.4.671
- S. Lee and W. Jeong, "A Study on Authentication Algorithm for NFC Security Channel", J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 805-810 https://doi.org/10.13067/JKIECS.2012.7.4.805
- M. Shahzad, A. X. Liu, and A. Samuel, "Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it," Proc. of the 19th Annual Int. Conf. on Mobile Computing & Networking, MobiCom '13, Miami, USA, Sept. 2013, pp. 39-50.
- H. Sun, S. Chen, J. Yeh, and C. Cheng, "A Shoulder Surfing Resistant Graphical Authentication System," IEEE Trans. Dependable and Secure Computing, vol. pp, issue 99, 2016, pp.11-16.
- T. Takada, "FakePointer: An Authentication Scheme for Improving Security against Peeping Attacks using Video Cameras," Proc. of Int. Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies, Valencia, Spain, Sept. 2008, pp. 395-400.
- H. Kim, H. Seo, Y. Lee, T. Park, and H. Kim, "Implementation of Secure Virtual Financial Keypad for Shoulder Surfing Attack," Review of Korea Institute of Information Security and Cryptograph (KIISC), vol. 23, no. 6, 2013, pp. 21-29.
- L. Cai and H. Chen, "TouchLogger: Inferring Keystrokes on Touch Screen from Smart-phone Motion," Proc. of the 6th USENIX Conf. on Hot Topics in Security, San Francisco, USA, Aug. 2011, pp.9.
- E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R.R. Choudhury, "TapPrints: Your Finger Taps Have Fingerprints," Proc. of the 10th Int. Conf. on Mobile Systems, Applications, and Services, Lake District, UK, Jun. 2012, pp. 323-336.
- Y. Lee, "An Analysis on The Vulnerability of Secure Keypads for Mobile Devices," J. of Korean Society for Internet Information, vol. 14, no. 3, 2013, pp. 15-21.
- D. Lee, D. Bae, S. You, J. Chae, Y. Lee, and H. Yang, "An Analysis on the Security of Secure Keypads for Smartphone," Review of Korea Institute of Information Security and Cryptograph (KIISC), vol. 21, no. 7, 2011, pp. 30-37.
- S. Schneegass, F. Steimle, A. Bulling, F. Alt, and A. Schmidt, "SmudgeSafe : Geometric Image Transformations for Smudge-resistant User Authentication," 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, SEATTLE, USA, Sept. 2014, pp. 775-786.