Acknowledgement
Grant : 상황인지기반 멀티팩터 인증 및 전자서명을 제공하는 범용인증플랫폼기술 개발
Supported by : 정보통신기술진흥센터
References
- FIDO Alliance, Accessed 2017. https://fidoalliance.org/
- FIDO Specifications, Accessed 2017. https://fidoalliance.org/download/
- W. Meng, D.S. Wong, S. Furnell, and J. Zhou, "Surveying the Development of Biometric User Authentication on Mobile Phones," IEEE Commun. Surveys Tutorials, vol. 17, no. 3, 2015, pp. 1268-1293. https://doi.org/10.1109/COMST.2014.2386915
- U. Mahbub, S. Sarkar, and R. Chellappa, "Partial Face Detection in the Mobile Domain," arXiv preprint arXiv: 1704.02117, 2017.
- S.H. Oh, G.W. Kim, and K. Lim, "Compact Deep Learned Feature-Based Face Recognition for Visual Internet of Things," J. Supercomput., 2017, pp. 1-13.
- S. Sarkar, V.M. Patel, and R. Chellappa, "Deep Feature-Based Face Detection on Mobile Devices," in Proc. IEEE Int. Conf. Identity Security Behavior Anal., Sendai, Japan, 2016, pp. 1-8.
- A. Krizhevsky, I. Sutskever, and G.E. Hinton, "Imagenet Classification with Deep Convolutional Neural Networks," in Adv. Neural Inform. Process. Syst., Lake Tahoe, NV, USA, Dec. 2012, pp. 1097-1105.
- K.S. Ahmad, A.S. Thosar, J.H. Nirmal, and V.S. pande, "A Unique Approach in Text Independent Speaker Recognition Using MFCC Feature Sets and Probabilistic Neural Network," In Int. Conf. Adv. Pattern Recogn., Kolkata, India, Jan. 2015, pp. 1-6.
- M. Muaaz and R. Mayrhofer, "Smartphone-Based Gait Recognition: From Authentication to Imitation," IEEE Trans. Mobile Comput., vol. 16, no. 11, 2017, pp. 3209-3221. https://doi.org/10.1109/TMC.2017.2686855
- CC. Lin, C.C. Chang, D. Liang, and C.H. Yang, "A New Non-intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users," In IEEE Int. Conf. Softw. Security Reliability, Gaithersburg, MD, USA, June 2012, pp. 245-252.
- Y. Zhong, Y. Deng, and G. Meltzner, "Pace Independent Mobile Gait Biometrics," In IEEE Int. Conf. Biometrics Theory, Applicat. Syst., Arlington, VA, USA, Sept. 2015, pp. 1-8.
- C. Jien, "Capturing Cognitive Processing Time for Active Authentication," Iowa State University of Science and Technology, USA, AFRL-RI-RS-TR-2014-035, Feb. 2014.
- A.A.E. Ahmed and I. Traore, "A New Biometric Technology Based on Mouse Dynamics," IEEE Trans. Dependable Secure Comput., vol. 4, no. 3, 2007, pp. 165-179. https://doi.org/10.1109/TDSC.2007.70207
- C. Shen, X. Guan, and J. Cai, "A Hypo-Optimum Feature Selection Strategy for Mouse Dynamics In Continuous Identity Authentication and Monitoring," In IEEE Int. Conf. Inform. Theory Inform. Security, Bejing, China, Dec. 2010, pp. 349-353.
- N. Zheng, A. Paloski, and H. Wang, "An Efficient User Verification System via Mouse Movements," In ACM Conf. Comput. Commun. Security, Chicago, IL, USA, Oct. 2011, pp. 1-12.
- X. Zhao, T. Feng, and W. Shi, "Continuous Mobile Authentication Using a Novel Graphic Touch Gesture Feature," In IEEE Int. Conf. Biometrics: Theory, Applicat. Syst., Arlington, VA, USA, 2013, pp. 1-6.
- F. Iqbal, H. Binsalleeh, B.C. Fung, and M. Debbabi, "Mining wRiteprints from Anonymous E-Mails for Forensic Investigation," Digital Investigation, vol. 7, no. 1-2, Oct. 2010, pp. 56-64. https://doi.org/10.1016/j.diin.2010.03.003
- X. Chen, P. Hao, R. Chandramouli, and K.P. Subbalakshmi, "Authorship Similarity Detection from Email Messages," In Int. Conf. Mach. Learning Data Mining Pattern Recogn., vol. 6871, 2011, pp. 375-386.
- U. Mahbub and R. Chellappa, "PATH: Person Authentication Using Trace Histories," In IEEE Annu. Ubiquitous Comput., Electron. Mobile Commun. Conf., New York, USA, Oct. 2016, pp. 1-8.
- A.A. El Masri, "Active Authentication Using Behavioral Biometrics and Machine Learning," PhD Thesis, George Mason University, 2016.
- M.P. Centeno, A. van Moorsel, and S. Castruccio, "Smartphone Continuous Authentication Using Deep Learning Autoencoders," In Privacy, Security Trust, Aug. 2017.
- IDC, "Worldwide Revenue for Security Technology Forecast to Surpass $100 Billion in 2020, According to the New IDC Worldwide Semiannual Security Spending Guide," 2016, Accessed 2017. https://www.idc.com/getdoc.jsp?containerId=prUS41851116
- 한국인터넷진흥원, "2017년, 보안이 4차 산업혁명 플랫폼으로 자리 잡을 것," 2016 Accessed 2017. https://www.kisa.or.kr/notice/press_View.jsp?mode=view&p_No=8&b_No=8&d_No=1518&ST=total&SV=