어깨너머공격 모델링 및 보안 키패드 취약점 분석

논문상세정보
' 어깨너머공격 모델링 및 보안 키패드 취약점 분석' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 전자공학
  • attackpotential
  • security keypad
  • shoulder surfing attack
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
2,315 0

0.0%

' 어깨너머공격 모델링 및 보안 키패드 취약점 분석' 의 참고문헌

  • 한글과 숫자 낱글자의 가독성에 미치는 주요 요인 평가
    이인석 대한인간공학회지 28 (4) : 1 ~ 7 [2009]
  • 모바일 기기를 위한 보안 키패드의 취약점 분석
    이윤호 인터넷정보학회논문지 14 (3) : 15 ~ 21 [2013]
  • User Authentication Schemes for Mobile and Handheld Services
    M. N. Doja INFOCOMP Journal of Computer Science 7 (4) : 38 ~ 47 [2008]
  • Usage of domestic Internet banking services in 2014 first quarter
  • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    George A. Miller Psychol. Rev. 63 (2) [1956]
  • The Design and Analysis of Graphical Passwords
    Ian Jermyn Proceedings of the 8th USENIX Security Symposium [1999]
  • Shoulder surfing attack in graphical password authentication
    Arash Habibi Lashkari International Journal of Computer Science and Information Security 6 (2) [2009]
  • Seven plus or minus two : A commentary on capacity limitations
    Richard M. Shiffrin Psychological Review : 357 ~ 361 [1994]
  • STM-GOMS 모델: 모바일 스마트 기기 환경의 인증 기법을 위한 안전성 분석 모델
    신수연 정보보호학회논문지 22 (6) : 1243 ~ 1252 [2012]
  • RealUser
    The Science Behind Passfaces
  • Personal Space
    Wikipedia [2014]
  • No Tech Hacking: A guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
    Kevin D. Mitnick SYNGRESS : 27 ~ 60 [2007]
  • Legibility comparison of Korean characters and words : 474 ~ 477
  • Korean typography interface evaluation and development of legibility formula in smartpad device
  • Information Supplement: ATM Security Guidelines
    PCI Security Standards Council [2013]
  • Graphical Passwords:Learning from the First Twelve Years
  • Graphical Passwords: A Survey
    Xiaoyuan Suo IEEE Computer Security Applications Conference, 21st Annual : 463 ~ 472 [2005]
  • Graphical Passwords, In Lucent Technologies
    G. E. Blonder U. S. Patent, Ed. United States [1996]
  • Graphical Passwords
    Leonardo Sobrado The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research 4 [2002]
  • Evaluations of Factors Affecting Legibility
    Seung Min Mo Journal of the Ergonomics Society of Korea : 20 ~ 23 [2008]
  • Doodling Our Way to Better Authentication
    Goldberg, J. Hagman, J. Sazawal, V. ACM, Proceedings of Human Factors in Computing Systems : 868 ~ 869 [2002]
  • Designing leakage resilient password entry on touchscreen mobile devices
    Qiang Yan ACM CCS [2013]
  • Covert Attentional Shoulder Surfing : Human Adversaries Are More Powerful Than Expected
    Taekyoung Kwon IEEE Transactions on Systems, Man, And Cybernetics: Systems [2014]
  • Common Criteria: Evaluation Methodology
    Version 3.1, Revision 4 [2012]
  • Cognitive Psychology
    Jeongmo Lee HAKJISA [2009]
  • Back-of-device authentication on smartphones
    De Luca, A. Langheinrich, M. Maurer, M.-E. Nguyen, N.D.H. Rubegni, E. Scipioni, M.P. von Zezschwitz, E. ACM Proceedings of the SIGCHI Conference on Human Factors in Computing Systems : 2389 ~ 2398 [2013]
  • Application of Attack Potential to Smartcards
    Joint Interpretation Library [2006]
  • Application of Attack Potential to POIs
    Joint Interpretation Library [2011]
  • Application of Attack Potential to Hardware Devices with Security Boxes
    Joint Interpretation Library [2012]
  • A shoulder surfing resistant graphical password scheme
    Sunshuang Man Proceedings of International conference on security and management [2003]
  • 2014 Statistical information of the wireless communication subscriber
    Jaesik Mun [2014]