• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2019³â Ãá°èÇмú´ëȸ

2019³â Ãá°èÇмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ÀÇ»ç °áÁ¤ ¹æ¹ý·ÐÀ» ±â¹ÝÇÑ ¾Ïȣȭ ¾Ë°í¸®Áò ¼±È£µµ ºÐ¼®
¿µ¹®Á¦¸ñ(English Title) Analysis of Preference for Encryption Algorithm Based on Decision Methodology
ÀúÀÚ(Author) ÁøÂù¿ë   ½Å¼ºÀ±   ³²¼öÅ   Chan-Yong Jin   Seong-Yoon Shin   Soo-Tai Nam  
¿ø¹®¼ö·Ïó(Citation) VOL 23 NO. 01 PP. 0167 ~ 0168 (2019. 05)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù ½º¸¶Æ®Æù Àá±Ý ÇØÁ¦ ¹æ¹ýÀ¸·Î ¾Ïȣȭ ±â¼úÀ» »ç¿ëÇÏ¿© ´Ù¾çÇÑ ¾Ë°í¸®ÁòÀÌ Ã¤ÅÃÇÏ°í ÀÖ´Ù. ÀÌ¹Ì »ó¿ëÈ­¿¡ ¼º°øÇÑ Àΰ£ÀÇ »ýüÀÎ½Ä ±â¼ú·Î ÇØ°áÇÏ´Â ¹æÇâÀ¸·Î ³ª¾Æ°¡°í ÀÖ´Ù. ÀÌ·¯ÇÑ ¹æ¹ý¿¡´Â Áö¹®ÀνÄ, ¾ó±¼ÀÎ½Ä ¹× ȫäÀÎ½Ä µîÀÌ Æ÷ÇÔÇÑ´Ù. º» ¿¬±¸¿¡¼­´Â ÀÌ¹Ì »ó¿ëÈ­µÈ »ýüÀÎ½Ä ±â¼ú ¹× ÆÐÅÏÀÎ½Ä ¹× ¾ÏÈ£ÀÔ·Â ¹æ¹ýÀ» Æò°¡Ç׸ñÀ¸·Î ¼±Á¤ ÇÏ¿´´Ù. Æò°¡Ç׸ñÀº Áö¹®ÀνÄ, ¾ó±¼ÀÎ½Ä È«Ã¤ÀνÄ, ÆÐÅÏÀÎ½Ä ¹× ¾ÏÈ£ ÀԷ¹æ¹ý µî ´Ù¼¸ °¡Áö ¾Ë°í¸®ÁòÀ¸·Î ±¸¼ºµÇ¾î ÀÖ´Ù. ÀÌ·¯ÇÑ ¾Ë°í¸®ÁòÀ» ±â¹ÝÀ¸·Î °èÃþÀû ºÐ¼® ¹æ¹ý·ÐÀ» ¹ÙÅÁÀ¸·Î ½º¸¶Æ®Æù »ç¿ëÀÚÀÇ ¾Ïȣȭ ¾Ë°í¸®Áò ¼±È£µµ¸¦ ºÐ¼®ÇÏ¿´´Ù. ¶ÇÇÑ ºÐ¼®°á°ú¸¦ ¹ÙÅÁÀ¸·Î ÀÌ·ÐÀû ½Ã»çÁ¡À» Á¦½ÃÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Lately, variety of algorithms using encryption technology has been adopted as methods of unlocking smartphone. It is advancing toward the direction to solve through human biometrics technology which has already succeeded in commercialization. These include finger print recognition, face recognition, and iris recognition. In this study, we selected biometrics recognition technology and pattern recognition and password input methods which are already commercialized as evaluation items. The evaluation items are five algorithms including finger print recognition, face recognition iris recognition, pattern recognition and password input method. Based on these algorithms, analytic hierarchy process is used to analyze the preference of smartphone users. Also, the theoretical implications are presented based on the analysis results.
Å°¿öµå(Keyword) Decision support   Encryption technology   Preference   Smartphone  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå