최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기멀티미디어학회논문지 = Journal of Korea Multimedia Society, v.25 no.7, 2022년, pp.932 - 944
Smartphones, are currently equipped with high-performance hardware to process large amounts of data and provide most of the functions provided by desktop PCs. In addition, the smartphones enable quick user authentication through biometric information collected from embedded sensors. However, the bio...
Form factor (mobile phones)(2016), https://infogalactic.com/info/Form_factor_(mobile_phones) (accessed March 14, 2022).
From Foldable Phones to Stretchy Screens (2020), https://spectrum.ieee.org/consumer-electronics/portable-devices/from-foldable-phones-to-stretchy-screens (accessed March 14, 2022).
E. Huitema, "The Future of Display Is Foldable," Information Display, Vol. 28, Issue 2-3, pp. 6-10, 2012.
W. Guo, Y. Lee, and J. Chung, "Exploring Consumer Perception and Acceptance of Foldable Smartphone Using Text Mining: Focused on Galaxy Z Flip," Journal of Consumer Studies, Vol. 32, No. 4, pp. 59, 2021.
Y. Jin and E. Yu, "An Evaluation of User Experience of Foldable Phones in Terms of Design Attributes and Proposed Future Design Directions," Journal of Integrated Design Research, Vol. 18, No. 4, pp. 63-80, 2019.
W. Lee and R.B. Lee, "Multi-Sensor Authentication to Improve Smartphone Security," 2015 International Conference on Information Systems Security and Privacy, pp. 1-11, 2015.
X. Su, Z. Wang, X. Liu, C. Choi, and D. Choi, "Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures," Security and Communication Networks, Vol. 2018, ArticleID 426934, pp. 1-14, 2018.
C. Adams, "Personal Identification Number (PIN)," Encyclopedia of Cryptography and Security, pp. 927, 2011.
A. Nayak and R. Bansode, "Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points," 7th International Conference on Communication, Computing and Virtualization 2016, pp. 553-560, 2016.
I. Kim, "Keypad against Brute Force Attacks on Smartphones," IET Information Security, Vol. 6, No. 2, pp. 71-76, 2012.
A.K. Kyaw, F. Sioquim, and J. Joseph, "Dictionary Attack on Wordpress: Security and Forensic Analysis," Proceedings of the 2nd International Conference on Information Security and Cyber Forensics, pp. 158-164, 2015.
E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R.R. Choudhury, "TapPrints: Your Finger Taps Have Fingerprints," Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323-336, 2012.
T. Takada, "Fake Pointer: An Authentication Scheme for Improving Security against Peeping Attacks using Video Cameras," Proceeding of International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 395-400, 2008.
A.J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J.M. Smith, "Smudge Attacks on Smartphone Touch Screens," Proceeding of USENIX Conference on Offensive Technologies, pp. 1-7, 2010.
Y. Abdelrahman, M. Khamis, S. Schneegass, and F. Alt, "Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication," Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3751-3763, 2017.
H. Seo, Z. Liu, G. Seo, T. Park, J. Choi, and H. Kim, "Open Sesame! Hacking the Password," Proceeding of 16th International Workshop on Information Security Applications, pp. 215-226, 2015.
M. Shahzad, A.X. Liu, and A. Samuel, "Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures: You Can See It But You Can Not Do It," Proceeding of the 19th Annual International Conference on Mobile Computing & Networking, pp. 39, 2013.
D. Choi, "Indirect PIN Entry Method for Mobile Banking Using Relation Location Information of Secret Code," Journal of Korea Multimedia Society, Vol. 23, No. 6, pp. 738-746, 2020.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.