This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Mingoo Kang, et al., “individual digital safe system for set-top box by use of FIDO transaction certification and multiple DID personal identification”, Korea patent 10-2021-0126039, 2021.09.24KangMingooKorea patent 10-2021-0126039, 2021.09.24Search in Google Scholar
E. Klieme, J. Wilke, N. van Dornick and C. Meinel, “FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication,” 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1857–1867, 2020KliemeE.WilkeJ.van DornickN.MeinelC.2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)185718672020Search in Google Scholar
Lyastani, S. G., Schilling, M., Neumayr, M., Backes, M., & Bugiel, S. “Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Password-less Authentication,” in IEEE Symposium on Security and Privacy, pp. 268–285, May 2020LyastaniS. G.SchillingM.NeumayrM.BackesM.BugielS.inIEEE Symposium on Security and Privacy268285May 2020Search in Google Scholar
Peter Smith, Nipun Srivastava, “A Market Overview of Custody for Digital Assets” Deloitte Digital Custodian Whitepaper, June 2020SmithPeterSrivastavaNipunDeloitte Digital Custodian WhitepaperJune 2020Search in Google Scholar
Mingoo Kang, Seungpil Hong. Sangchul Shin and Sangyep Nam, Digital Asset and Security, Sanghakdang, 2022KangMingooHongSeungpilShinSangchulNamSangyepSanghakdang2022Search in Google Scholar
Rivera-Dourado, Martiño, et al. ‘An Analysis of the Current Implementations Based on the WebAuthn and FIDO Authentication Standards.” Engineering Proceedings 7.1(56). 2021Rivera-DouradoMartiño‘An Analysis of the Current Implementations Based on the WebAuthn and FIDO Authentication Standards.”71562021Search in Google Scholar
Biryukov, A., & Tikhomirov, S. “Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash.” Pervasive and Mobile Computing, 59, 101030. 2019BiryukovA.TikhomirovS.“Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash.”591010302019Search in Google Scholar
Yeo, Hyeopgoo. “Touch fingerprint sensor based on sensor cell isolation technique with pseudo direct signaling.” International Journal on Smart Sensing and Intelligent Systems, vol.12, no.1, pp.1–9. 2019YeoHyeopgoo“Touch fingerprint sensor based on sensor cell isolation technique with pseudo direct signaling.”121192019Search in Google Scholar
E. Rahmawati et al., “Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone.” 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), pp. 234–238. 2017RahmawatiE.2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA)2342382017Search in Google Scholar
Lee, D., Kim, D. C., Kwon, D., & Kim, H. “Efficient hardware implementation of the lightweight block encryption algorithm LEA.” Sensors, vol 14(1), pp 975–994. 2014LeeD.KimD. C.KwonD.KimH.“Efficient hardware implementation of the lightweight block encryption algorithm LEA.”1419759942014Search in Google Scholar
J. Sun, Q. Zhong, L. Kou, W. Wang, Q. Da and Y. Lin, “A lightweight multi-factor mobile user authentication scheme.” IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 831–836. 2018SunJ.ZhongQ.KouL.WangW.DaQ.LinY.IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)8318362018Search in Google Scholar
Katuk, Norliza, and Ikenna Rene Chiadighikaobi. “An Enhanced Block Pre-Processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment.” International Journal of Communication Networks and Information Security, 13.3 pp. 474–481. 2021KatukNorlizaChiadighikaobiIkenna Rene“An Enhanced Block Pre-Processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment.”1334744812021Search in Google Scholar
Hong, D., Lee, J. K., Kim, D. C., Kwon, D., Ryu, K. H., & Lee, D. G. (2013, August). “LEA: A 128-bit block cipher for fast encryption on common processors.” In international workshop on information security applications (pp. 3–27). Springer, Cham. 2013HongD.LeeJ. K.KimD. C.KwonD.RyuK. H.LeeD. G.2013AugustIn international workshop on information security applications327Springer, Cham2013Search in Google Scholar
Sonh, S. “Design of Encryption/Decryption IP for Lightweight Encryption LEA.” Journal of Internet Computing and Services, 18(5), vol 8. 2017SonhS.“Design of Encryption/Decryption IP for Lightweight Encryption LEA.”18582017Search in Google Scholar
Hong, D., Lee, J. K., Kim, D. C., Kwon, D., Ryu, K. H., & Lee, D. G. “LEA: A 128-bit block cipher for fast encryption on common processors.” In international workshop on information security applications (pp. 3–27). Springer, Cham. August 2013.HongD.LeeJ. K.KimD. C.KwonD.RyuK. H.LeeD. G.In international workshop on information security applications327Springer, ChamAugust 2013Search in Google Scholar
D. Cho, “A Simple Fingerprint Fuzzy Vault for FIDO.” KSII Transactions on Internet and Information Systems, vol. 10, no. 11, pp. 5674–5128, 2016.ChoD.“A Simple Fingerprint Fuzzy Vault for FIDO.”1011567451282016Search in Google Scholar
Y. Chen, Y. Ge, W. Wang and F. Yang, “A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.” KSII Transactions on Internet and Information Systems, vol. 12, no. 4, pp. 1779–1798, 2018ChenY.GeY.WangW.YangF.“A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.”124177917982018Search in Google Scholar
Gyeong-Jin Ra and Im-Yeong Lee. 2018. “A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments.” KSII Transactions on Internet and Information Systems, 12, 2, pp 892–905. 2018RaGyeong-JinLeeIm-Yeong2018“A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments.”1228929052018Search in Google Scholar
Y. Zhang and X. Jia, “Fast image encryption algorithm based on substitution and diffusion.” KSII Transactions on Internet and Information Systems, vol. 12, no. 9, pp. 4487–4511, 2018ZhangY.JiaX.“Fast image encryption algorithm based on substitution and diffusion.”129448745112018Search in Google Scholar