1. Hyeonseung, K., Chunsik, P.: Cloud computing and personal authentication service. J. Korea Inst. Inf. Secur. Cryptol. 20(2), 11–19 (2010)
2. Roh, G.-S., Joo, S.-H., Jung, J.-T.: An exploratory study on concept and realization conditions of smart learning. J. Dig. Policy Manag. 9(2), 79–88 (2012)
3. Jeong, Y.-S., Lee, S.-H.: User authentication protocol through distributed process for cloud environment. J. Korea Inst. Inf. Secur. Cryptol. 22(4), 841–884 (2012)
4. Jeong, H.-Y., Kim, Y.-H.: A design of u-Learning’s teaching and learning model in the cloud computing environment. Korea Navig. Inst. (KONI) 13(5), 781–786 (2009)
5. Lee, S., Lim, T., Lee, H.J.: Two factor authentication for cloud computing. Int. J. KIMICS 8, 427–432 (2010)