최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국정보통신학회논문지 = Journal of the Korea Institute of Information and Communication Engineering, v.23 no.11, 2019년, pp.1471 - 1477
임지우 (Department of IT Engineering, Hansung University) , 이승재 (Department of IT Engineering, Hansung University) , 장원준 (Department of IT Engineering, Hansung University) , 권혁동 (Department of IT Engineering, Hansung University) , 서화정 (Department of IT Engineering, Hansung University)
Currently, there are various security methods in smart phone. Among them, pin number and pattern lock were used long as they were used from early smart phone. However, security is weak that much. The security of pin number is slightly high, but the security of conventional pattern lock remains moder...
M. D. Loge, "Tell Me Who You Are and I Will Tell You Your Unlock Pattern," M. S. theses, Norwegian University of Science and Technology, Trondheim, Sor-Trondelag, 2015.
A. H. Lashkari, S. Farmand, O. B. Zakaria, and R. Saleh, "Shoulder Surfing attack in graphical password authentication," International Journal of Computer Science and Information Security, vol. 6, no. 2, pp. 145-154, Nov. 2009.
A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, "Smudge attacks on smartphone touch screens," in Workshop on Offensive Technologies'10 Proceedings of the 4th USENIX conference on Offensive technologies, Washington: DC, pp. 1-7, 2010.
P. Andriotis, G. Oikonomou, A. Mylonas, and T. Tryfonas, "A Study on Usability and Security Features of the Android Pattern Lock Screen," Information and Computer Security, vol. 24, no. 1, pp. 53-72, March. 2016.
G. Ye, Z. Tang, D. Fang, X. Chen, K. I. Kim, B. Taylor, and Z. Wang, "Cracking Android Pattern Lock in Five Attempts," in Proceedings 2017 Proceedings of the Network and Distributed System Security Symposium, San Diego: CA, pp. 1-1, 2017.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.