최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국산학기술학회논문지 = Journal of the Korea Academia-Industrial cooperation Society, v.22 no.5, 2021년, pp.325 - 333
최정문 (연세대학교 정보대학원) , 이정우 (연세대학교 정보대학원)
With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming ...
S. H. Jin, [Science Ongojisin]The Fourth Industrial Revolution and Huayibudong, Available From: https://www.etnews.com/20180218000060 (accessed Feb. 18, 2018)
J. H. Kee, The Past and Present of Authentication Technology -Introduction to Concepts and Cases-, Weekly Technology Trend Report, IITP, Korea, pp.13-22.
K. M. Choi, Smartphone location-based authentication applied for the improvement of public cloud security, Master's thesis, Dongguk University Graduate School of International Affairsand Information, Seoul, Korea, pp.15-16, 2013.
H. J. Ann, Non-facing authentication Security threat analysis and security measures: Establishment of checklist basis for minimizing non-facing authentication security threats, Master's thesis, Konkuk University Graduate School of Information and Communication, Seoul, Korea, pp.4, 2019.
S. Y. Kim, E-finance and Financial security2, p.160, Financial security institute, 2015, pp.59-94.
Korea Communications Commission, A plan to promote the use of location information for fostering LBS industries and upgrading social safety nets (plan), pp.5-6, 2010.
S. M. Kim, Study on the Usage of Location-Based Services App on Smartphones: Focusing on the Perceived Risk, Master's thesis, Hanyang cyber university Graduate School of Business, Seoul, Korea, pp.5, 2014.
N. J. Park, Y. J. Song, K. Y. Moon, "Application of Certification and Security for Secure Location-Based Services", Korea Institute Of Information Security And Cryptology, 14, 3, pp.56-67, 2004.
H. J. Seo, H. W. Kim, A Location based Two-Factor L-OTP Protocol. The KIPS Transactions: PartC, 18C, 5, pp.327-330, 2011.
H. G. Youn, [Issue lighting] Attention to PUF technology in the coming IoT era, Available From: http://www.comworld.co.kr/news/articleView.html?idxno49025 (accessed Jan. 12, 2021)
H. W. Lee, H. G. Sine, "Consideration of strong user authentication methods for memory hacking attacks, Korea Institute Of Information Security And Cryptology, 23, 6, pp.67-75, 2013.
Y. K. Park, Online Information Security System Utilizing Cell Broadcasting Service, The Korean Intellectual Property Office, Korea, pp.12-13, 2016.
S. H. Yeom, Watch out for unlicensed car accidents in the coming holiday season, Available From: https://www.jjan.kr/news/articleView.html?idxno2087091 (accessed July. 12, 2020)
Hankyung Dotcom Newsroom, [securities firms working with startups] L-Fin's location-based authentication service is applied by Korea Investment &Securities, Available From: https://www.hankyung.com/economy/article/202008273705a (accessed Nov. 10, 2020)
S. H. Yang, Even a father who is not good at Smartphones can do it in a minute. Available From: https://news.mt.co.kr/mtview.php?no2020040309393048053 (accessed Dec. 01, 2020)
IT World, HPE Aruba Announces Digital Workplace Research Results, Available From: https://www.itworld.co.kr/news/110660 (accessed Dec. 01, 2020)
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.