A low-cost secure schemes for authentications and access control with the use of multiple public IC cards

Kuo Yi Chen, Chin Yang Lin, Ting-Wei Hou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In the present day, the requirements of security in modern information systems are increasing significantly. Among secure requirements, the personal identification plays an important role for authentications and access control. However, traditional id/password pairs could be disabled by modern hacking techniques and social engineering easily. In order to provide stronger access control for organizations, personal identification tokens are widely used in the present day. With the features, unique and un duplicable, personal identification tokens could be used to provide strong reliability for user authentication. However, the cost of issuing a propriety identification tokens for each employee could be expensive. The high cost may block the managers to adopt token-based secure schemes, and then reduce the secure levels of organizations. In this paper, a low-cost secure scheme is proposed. This scheme is based on widely used public cards which employees would have by themselves. The combination of multiple public cards can be used to build strong secure protections by weight-calculating algorithms, and then provide adaptable secure levels for each user. Thus organizations could have strong secure protections without additional cost.

Original languageEnglish
Title of host publicationICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings
DOIs
Publication statusPublished - 2010 Nov 15
Event2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE 2010 - Chengdu, China
Duration: 2010 Aug 202010 Aug 22

Publication series

NameICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings
Volume3

Other

Other2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE 2010
CountryChina
CityChengdu
Period10-08-2010-08-22

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'A low-cost secure schemes for authentications and access control with the use of multiple public IC cards'. Together they form a unique fingerprint.

Cite this