Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/69052
DC FieldValueLanguage
dc.contributor.authorJan, J.K.en_US
dc.contributor.authorTseng, Y.M.en_US
dc.date1998zh_TW
dc.date.accessioned2014-06-11T05:57:46Z-
dc.date.available2014-06-11T05:57:46Z-
dc.identifier.issn1350-2387zh_TW
dc.identifier.urihttp://hdl.handle.net/11455/69052-
dc.description.abstractWith the growth in the scale of network technologies, security has become a major concern and a limiting factor. Computer networks provide convenient procedures for users operating at remote places. However, an intruder can easily access and intercept information transmitted in an open channel. Two integrated schemes for user authentication and access control are proposed, which are mechanisms used to provide for the protection of privacy and security in a distributed environment. One scheme is a dynamic approach which provides an efficient updating process for the modification of access rights. The second scheme allows servers to simplify verification processes for multiple access requests of a user at the same time. Both schemes are noninteractive approaches in which security is based on the computational difficulty of solving the discrete logarithm problem. Compared with other schemes proposed previously, the schemes are more secure and efficient and suitable for applications in a distributed environment. Intruders cannot derive secret information from public information. Intruders are not able to acquire the passwords of users from previously intercepted messages. By applying a time stamp, the schemes can withstand the replaying attack.en_US
dc.language.isoen_USzh_TW
dc.relationIee Proceedings-Computers and Digital Techniquesen_US
dc.relation.ispartofseriesIee Proceedings-Computers and Digital Techniques, Volume 145, Issue 6, Page(s) 419-424.en_US
dc.relation.urihttp://dx.doi.org/10.1049/ip-cdt:19982346en_US
dc.subjectaccess controlen_US
dc.subjectcredentialen_US
dc.subjectdiscrete logarithmen_US
dc.subjectsecurityen_US
dc.subjectsmart carden_US
dc.subjecttime stampen_US
dc.subjectuser authenticationen_US
dc.titleTwo integrated schemes of user authentication and access control in a distributed computer networken_US
dc.typeJournal Articlezh_TW
dc.identifier.doi10.1049/ip-cdt:19982346zh_TW
item.grantfulltextnone-
item.openairetypeJournal Article-
item.cerifentitytypePublications-
item.fulltextno fulltext-
item.languageiso639-1en_US-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
Appears in Collections:期刊論文
Show simple item record
 

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.