Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 781014, 9 pages
http://dx.doi.org/10.1155/2014/781014
Research Article

A Rhythm-Based Authentication Scheme for Smart Media Devices

1Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 139-743, Republic of Korea
2Department of Multimedia Engineering, Dongguk University, Seoul 100-715, Republic of Korea

Received 12 March 2014; Accepted 19 April 2014; Published 7 July 2014

Academic Editor: Jason C. Hung

Copyright © 2014 Jae Dong Lee et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H.-W. Kim, J.-H. Kim, D. Ko, E.-H. Song, and Y.-S. Jeong, “8-Way lock for personal privacy of smart devices based on human-centric,” in Proceedings of the 40th Conference of the KIPS, vol. 20, pp. 735–737, KIPS, November 2013.
  2. K. Peng, “A secure network for mobile wireless service,” Journal of Information Processing Systems, vol. 9, no. 2, pp. 247–258, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Ahn and R. Han , “An indoor augmented-reality evacuation system for the smartphone using personalized pedometry,” Human-Centric Computing and Information Sciences, vol. 2, article 18, 2012. View at Publisher · View at Google Scholar
  4. C.-L. Tsai, C.-J. Chen, and D.-J. Zhuang, “Trusted M-banking Verification Scheme based on a combination of OTP and Biometrics,” Journal of Convergence, vol. 3, no. 3, pp. 23–29, 2012. View at Google Scholar
  5. G. Wang, W. Zhou, and L. T. Yang, “Trust, security and privacy for pervasive applications,” Journal of Supercomputing, vol. 64, no. 3, pp. 661–663, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. Y. Gong, Implications and Agreement of Smartphone, vol. 22, no. 4, Korea Information Society Development Institute, Seoul, Republic of Korea, 2010.
  7. ITU-T, “Security aspects of mobile phones,” T09 SG17 100407 TD PLEN 1012, April 2010.
  8. C. Mulliner, G. Vigna, D. Dagon, and W. Lee, “Using labeling to prevent cross-service attacks against smart phones,” in Detection of Intrusions and Malware & Vulnerability Assessment: Proceedings of the 3rd International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, vol. 4064 of Lecture Notes in Computer Science, pp. 91–108, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  9. M. Park, The evolution of the mobile phones with touchscreen and the prospect of future: focused on the SRI-Tech [M.S. thesis], Incheon University, 2011.
  10. E. Chin, A. P. Felt, V. Sekar, and D. Wagner, “Measuring user confidence in smartphone security and privacy,” in Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS '12), 16, p. 1, Washington, DC, USA, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, “Smudge attacks on smartphone touch screens,” in Proceedings of the 4th USENIX Conference on Offensive Technologies, pp. 1–10, August 2010.
  12. B. Chojar, D. Lal, K. Gandhi, and K. Salariya, “Study of smartphone attacks and defenses,” International Journal of Engineering and Computer Science, vol. 2, no. 4, pp. 1018–1022, 2013. View at Google Scholar
  13. A. Mylonas, S. Dritsas, B. Tsoumas, and D. Gritzalis, “Smartphone security evaluation—the malware attack case,” in Proceedings of the 8th International Conference on Security and Cryptography (SECRYPT '11), pp. 25–36, Seville, Spain, July 2011. View at Scopus
  14. B. Kim and Y. Kim, “A study on emotional interface design based on each Smart-phone application category,” Korea Design Knowledge Society, vol. 20, pp. 181–192, 2011. View at Google Scholar
  15. D.-R. Kim and K.-H. Han, “A study on multi-media contents security using smart phone,” The Journal of Digital Policy and Management, vol. 11, no. 11, pp. 675–682, 2013. View at Google Scholar
  16. G. Kim and S. Cho, “Security vulnerability trends in smartphones,” in Proceedings of the Korea Computer Congress (KCC '11), vol. 37, no. 2, pp. 90–94, November 2011.