References
- Sunghyun Yun, "The Biometric Authentication Scheme Capable of Multilevel Security Control," Journal of the Korea Convergence Society, Vol. 8, No. 2, pp. 9-14, 2017. https://doi.org/10.15207/JKCS.2017.8.2.009
- Sunghyun Yun, "The Biometric Authentication based Dynamic Group Signature Scheme," Journal of the Korea Convergence Society, Vol. 7, No. 1, pp. 49-55, 2016. https://doi.org/10.15207/JKCS.2016.7.1.049
- Won-Jun Jang, Hyung-Woo Lee, "Biometric One-Time Password Generation Mechanism and its Application on SIP Authentication," Journal of the Korea Convergence Society, Vol. 1, No. 1, pp. 93-100, 2010.
- Sang-Rae Cho et.al., "Passwordless Authentication Technology-FIDO," Electronics and Telecommunications Trends, 2014.
- Jaejung Kim, "Study on the password-free certification system using the FIDO (Fast IDentity Online)," Communications of the Korean Institute of Information Scientists and Engineers, Vol. 33, No. 5, pp. 9-12, 2015.
- SuHyeong Kim, "FIDO Based PinTech Authentication Technology," The Journal of The Korean Institute of Communication Sciences, Vol. 33, No. 2, pp. 59-65, 2016.
- Sangrae Cho, YoungSeob Cho, Soohyung Kim, "Overview FIDO 2.0 Authentication Technology," Korea Institute Of Information Security And Cryptology, REVIEW OF KIISC, Vol. 26, No. 2, pp. 14-19, 2016.
- Seungchul Park, "A Comparative Analysis of PKI Authentication and FIDO Authentication," Journal of the Korea Institute of Information and Communication Engineering, Vol. 21, No. 7, pp. 1411-1419, 2017. https://doi.org/10.6109/JKIICE.2017.21.7.1411
- Seungjin Han, "A Robust Mutual Authentication between User Devices and Relaying Server(FIDO Server) using Certificate Authority in FIDO Environments," Journal of the Korea Society of Computer and Information, Vol. 21, No. 10, pp. 63-68, 2016. https://doi.org/10.9708/JKSCI.2016.21.10.063
- Byoungcheon Lee, "Certified Key Management in Multi K-FIDO Device Environment," Journal of the Korea Institute of Information Security & Cryptology, Vol. 27, No. 2, pp. 293-303, 2017. https://doi.org/10.13089/JKIISC.2017.27.2.293
- Han-Gyu Ko, Jin-Man Cho, Daeseon Choi, "An Incremental Elimination Method of EEG Samples Collected by Single-Channel EEG Measurement Device for Practical Brainwave-Based User Authentication," Journal of the Korea Institute of Information Security & Cryptology, Vol. 27, No. 2, pp. 383-395, 2017. https://doi.org/10.13089/JKIISC.2017.27.2.383
- W. Khalifa, A. Salem, M. Roushdy, and K. Revett, "A Survey of EEG Based User Authentication Schemes," Proceedings of the 2012 8th International Conference on Informatics and Systems, pp. 55-60, 2012.
- David Starling, "Temporal Analysis of EEG patterns in a biofeedback based Brain Computer Interface," Tech Report No. CYB/2003/UG/DJS/1.
- G. Costantini, M. Todisco, D. Casali, M. Carota, G. Saggio, L. Bianchi, M. Abbafati and L. R. Quitadamo, "SVM Classification of EEG Signals for Brain Computer Interface," Proc. of the 2009 Confer- ence on Neural Nets WIRN09: Proceedings of the 19th Italian Workshop on Neural Networks, pp. 229-233, 2009.
- Chung-heon Lee, Jang-woo Kwon, Gyu-dong Kim, Jun-eui Hong, Dae-Seob Shin, Donghoon Lee, "A Study on EEG based Concentration Transmission and Brain Computer Interface Application," The Institute of Electronics Engineers of Korea - System and Control, Vol. 46, No. 2, pp. 41-46, 2009.
- J. Chuang, H. Nguyen, C. Wang, and B. Johnson, "I think, therefore I am: Usability and Security of Authentication using Brainwaves," Proceedings of the 2013 Workshop on Usable Security, pp. 1-16, 2013.