참고문헌
- M. Sharifi and S. H. Siadati, "A phishing sites blacklist generator," in Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, pp.840-843, 2008.
- Y. Zhang, J. Hong, and L. Cranor, "CANTINA: A content-based approach to detecting phishing web sites," in Proceedings of the 16th International Conference on World Wide Web, Banff, pp.8-12, 2007.
- J. H. Sa and S. J. Lee, "Real-time phishing site detection method," Journal of the KIISC, Vol.22, No.4, pp.819-825, 2012.
- OpenSSL, SSL/TLS MITM vulnerability (CVE-2014-0224) [Internet], https://www.openssl.org/news/secadv/20140605.txt.
- T. Li and Y. Wu, "Trust on web browser: attack vs. defense," in Proceedings of the International Conference on Applied Cryptography and Network Security, pp.241-253, 2003.
- NETCRAFT, Netcraft Extension [Internet], http://toolbar.netcraft.com.
- PhishTank, Join the fight against phishing [Internet], http://www.phishtank.com.
- Mozilla, FirePhish Anti-Phishing Extension [Internet], https://addons.mozilla.org/en-US/firefox/addon/firephish-anti-phishing-extens.
- S. Kim, J. Kang, and Y. Kim, "Countermeasures against phishing/pharming via portal site for general users," The Journal of KICS, Vol.40, No.6, pp.1107-1113, 2015. https://doi.org/10.7840/kics.2015.40.6.1107
- Y. S. Lee, N. H. Kim, H. T. Lim, H. K. Jo, and H. J. Lee, "Online banking authentication system using mobile-OTP with QR-code," in Proceedings of 5th International Conference on Computer Sciences and Convergence Information Technology, pp.644-648, 2010.
- A. Gandhi, B. Salunke, S. Ithape, V. Gawade, and S. Chaudhari, "Advanced online banking authentication system using one time passwords embedded in Q-R code," International Journal of Computer Science and Information Technologies, Vol.5, No.2, pp.1327-1329, 2014.
- J. Lee, H. You, C. Cho, and M. Jun, "A design secure QR-Login user authentication protocol and assurance methods for the safety of critical data using smart device," The Journal of KICS, Vol.37C, No.10, pp.949-964, 2012. https://doi.org/10.7840/kics.2012.37C.10.949
- S. Seo, C. Choi, G. Lee, and H. Choi, "QR code based mobile dual transmission OTP system," The Journal of KICS, Vol.38B, No.5, pp.377-384, 2013. https://doi.org/10.7840/kics.2013.38B.5.377
- J. Park, J. Kim, M. Shin, and N. Kang, "QR-code based mutual authenctication system for web service," The Journal of KICS, Vol.39B, No.4, pp.207-215, 2014. https://doi.org/10.7840/kics.2014.39B.4.207
- M. Sandirigama, A. Shimizu, and M. T. Noda, "Simple and secure password authentication protocol(SAS)," IEICE Transactions on Communications, Vol.E83-B, pp.1363-1365, 2000.
- C. L. Lin, H. M. Sun, and T. Hwang, "Attacks and solutions on strong-password authentication," IEICE Transactions on Communications, Vol.E84-B, pp.2622-2627, 2001.
- C. Y. Huang, S. P. Ma, and K. T. Chen, "Using one-time passwords to prevent password phishing attacks," Journal of Network and Computer Application, Vol.34, pp.1292-1301, 2011. https://doi.org/10.1016/j.jnca.2011.02.004
- W. C. Kuo and Y. C. Lee, "Attack and improvement on the one-time password authentication protocol against theft attacks," in Proceedings of the 6th International Conference on Machine Learning and Cybernetics, pp.1918-1922, 2007.
- M. Kim, B. Lee, S. Kim, and D. Won, "Weaknesses and improvements of a one-time password authentication scheme," International Journal of Future Generation Communication and Networking, Vol.2, pp.29-38, 2009.
- M. Sharifi, A. Saberi, M. Vahidi, and M. Zorufi, "A zero knowledge password proof mutual authentication technique against real-time phishing attacks," in Proceedings of the 3rd International Conference on Information Systems Security, pp.254-258, 2007.
- M. Saeed and H. S. Shahhoseini, "APPMA: An anti-phishing protocol with mutual authentication," in Proceedings of the 15th IEEE Symposium on Computers and Communications, pp.308-313, 2010.