Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 796515, 9 pages
http://dx.doi.org/10.1155/2014/796515
Research Article

Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device

1Department of Multimedia Engineering, Dongguk University, Seoul 100-715, Republic of Korea
2Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 139-743, Republic of Korea

Received 18 July 2014; Accepted 4 August 2014; Published 17 August 2014

Academic Editor: Jason C. Hung

Copyright © 2014 Hyun-Woo Kim et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, “Smudge attacks on smartphone touch screens,” in Proceedings of the 4th USENIX Conference on Offensive Technologies, pp. 1–7, USENIX Association, August 2010.
  2. D. van Bruggen, S. Liu, M. Kajzer, A. Striegel, C. R. Crowell, and J. D'Arcy, “Modifying smartphone user locking behavior,” in Proceedings of the 9th Symposium on Usable Privacy and Security (SOUPS '13), pp. 1–14, ACM, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. T. Kwon and S. Na, “TinyLock: affordable defense against smudge attacks on smartphone pattern lock systems,” Computers & Security, vol. 42, pp. 137–150, 2014. View at Publisher · View at Google Scholar
  4. O. Lindemann and M. H. Fischer, “Learning effects of arithmetic problem solving while unlocking a mobile phone,” Tech. Rep., 2013. View at Google Scholar
  5. J. Ahn and R. Han, “An indoor augmented-reality evacuation system for the smartphone using personalized pedometry,” Human-Centric Computing and Information Sciences, vol. 2, no. 18, 2012. View at Google Scholar
  6. H. J. Lee, “A study on the business strategy of smart devices for multimedia contents,” Journal of Information Processing System, vol. 7, no. 3, pp. 543–548, 2011. View at Publisher · View at Google Scholar
  7. L.-P. Cheng, F.-I. Hsiao, Y.-T. Liu, and M. Y. Chen, “Automatic screen rotation based on face orientation,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2203–2210, 2012.
  8. D. Balfanz, G. Durfee, D. K. Smetters, and R. E. Grinter, “In search of usable security: five lessons from the field,” IEEE Security and Privacy, vol. 2, no. 5, pp. 19–24, 2004. View at Publisher · View at Google Scholar · View at Scopus
  9. B. Bulgurcu, H. Cavusoglu, and I. Benbasat, “Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness,” MIS Quarterly, vol. 34, no. 3, pp. 523–548, 2010. View at Google Scholar · View at Scopus
  10. Y. Qin, W. Tong, J. Liu, and Z. Zhu,, “SmSD: a smart secure deletion scheme of SSDs,” Journal of Convergence, vol. 4, no. 4, pp. 30–35, 2013. View at Google Scholar
  11. S. D. Levitt, “Understanding why crime fell in the 1990s: four factors that explain the decline and six that do not,” Journal of Economic Perspectives, vol. 18, no. 1, pp. 163–190, 2004. View at Publisher · View at Google Scholar · View at Scopus
  12. C. Vroom and R. von Solms, “Towards information security behavioural compliance,” Computers and Security, vol. 23, no. 3, pp. 191–198, 2004. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Workman, W. H. Bommer, and D. Straub, “Security lapses and the omission of information security measures: a threat control model and empirical test,” Computers in Human Behavior, vol. 24, no. 6, pp. 2799–2816, 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. H.-W. Kim, A. Kang, L. Barolli, and Y.-S. Jeong, “Efficient locking scheme with OPOF on smart devices,” in Advances in Computer Science and its Applications, vol. 279 of Lecture Notes in Electrical Engineering, pp. 369–378, 2014. View at Publisher · View at Google Scholar
  15. H.-W. Kim, J.-H. Kim, D. J. Ko, E.-H. Song, and Y.-S. Jeong, “8-Way lock for personal privacy of smart devices based on human-centric,” in Proceedings of the 40th Conference of the KIPS, vol. 20, pp. 735–737, KIPS, November 2013.
  16. J. D. Lee, Y.-S. Jeong, and J. H. Park, “A rhythm-based authentication scheme for smart media devices,” The Scientific World Journal, vol. 2014, Article ID 781014, 9 pages, 2014. View at Publisher · View at Google Scholar