A low-cost secure schemes for authentications and access control with the use of multiple public IC cards

Kuo Yi Chen, Chin Yang Lin, Ting-Wei Hou

研究成果: Conference contribution

1 引文 斯高帕斯(Scopus)

摘要

In the present day, the requirements of security in modern information systems are increasing significantly. Among secure requirements, the personal identification plays an important role for authentications and access control. However, traditional id/password pairs could be disabled by modern hacking techniques and social engineering easily. In order to provide stronger access control for organizations, personal identification tokens are widely used in the present day. With the features, unique and un duplicable, personal identification tokens could be used to provide strong reliability for user authentication. However, the cost of issuing a propriety identification tokens for each employee could be expensive. The high cost may block the managers to adopt token-based secure schemes, and then reduce the secure levels of organizations. In this paper, a low-cost secure scheme is proposed. This scheme is based on widely used public cards which employees would have by themselves. The combination of multiple public cards can be used to build strong secure protections by weight-calculating algorithms, and then provide adaptable secure levels for each user. Thus organizations could have strong secure protections without additional cost.

原文English
主出版物標題ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings
DOIs
出版狀態Published - 2010 十一月 15
事件2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE 2010 - Chengdu, China
持續時間: 2010 八月 202010 八月 22

出版系列

名字ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings
3

Other

Other2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE 2010
國家China
城市Chengdu
期間10-08-2010-08-22

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Theoretical Computer Science

指紋 深入研究「A low-cost secure schemes for authentications and access control with the use of multiple public IC cards」主題。共同形成了獨特的指紋。

引用此