최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지. Journal of KIISE. 정보통신, v.36 no.6, 2009년, pp.552 - 557
One-time passwords are used just once and discarded, which makes it more secure than the repeatedly used conventional passwords. This paper proposes a challenge-response based one-time password generator on a user's mobile phone always carried with the user. The generator can provide an additional a...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
B. Schneier, "Two-Factor Authentication: Too Little, Too Late," Communications of the ACM, vol.48, no.4, April 2005
L. Lamport, "Password Authentication with Insecure Communication," Communications of the ACM, vol.24, no.11, pp.770-772, 1981
N. Haller, C. Metz, P. Nesser, and M. Straw, A One-Time Password System, RFC 2289, IETF, http://www.ietf.org/rfc/rfc2289.txt?number2289, 1998
B. Schneier, Man-in-the-Middle Attacks, Schneier on Security Blog, http://www.schneier.com/blog/archives/2008/07/maninthemid이e_1.html, July 2008
RSA SecurID, Security Y our Future with Two Factor Authentication, http://www.rsa.com/node.aspx?id1156/
VASCO The Authentication Company DIGIPASS, http:// www.vasco.com/products/digipass/digipass_index.aspx#
Mobile One Time Passwords, Mobile-OTP v. 1.06, http://motp.sourceforge.net/
FireID, The Universal Personal Authenticator, http://www.fireid.com/
VeriSign VlP Authentication Services, Trusted and Convenient Log-In and Transactions, http://www.verisign.com/authentication/consumer-authentication/vip-authentication
The Real Solution-Aradiom SolidPass, Security Token, http://www.aradiomcom/SolidPass/ 2fa-OTP-security-token.htm
MobileID, A mobile, two-way and two-factor authentication, http://www.deepnetsecurity.com/ products2/mobileid.asp
Swivel Authentication Solutions, PINsafe, http://www.swivelsecure.com/?pagepinsafe
PhoneFactor, PhoneFactor Solutions, http://www.phonefactor.com/ security_tokens/
S. Hallsteinsen, I. Jorstad, and D.V. Thanh, "Using the mobile phone as a security token for unified authentication," in Proc. 2nd Int'l Conf. on Systems and Networks Communications, 2007
F. Aloul, S. Zahidi, and W. El-Hajj, "Two Factor Authentication Using Mobile Phones," in Proc. of 7th ACS/IEEE Int'l Conf. on Computer Systems and Applications, May 2009
H. Wu, "A New Stream Cipher HC-256," in Proc. of 11th Int'l Workshop on Fast Software Encryption, LNCS 3017, pp.226-244, 2004
Security Fix-Citibank Phish Spoofs 2-Factor Authentication, http://blog.washingtonpost.com/ securityfix/2006/07/citibank_phish_spoofs_2factor_1.html
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.