期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
上机考试中身份证签到认证系统的应用设计
1
作者 刘广 周莲波 《电大理工》 2019年第4期27-31,共5页
当前国家开放大学的各项网络考试和上机考试种类很多,如全国高校网络教育部分公共课统一考试(以下简称统考)、开放教育统设课基于网络考试、省开课基于网络考试、计算机应用基础(新版教材)考试、计算机文化基础考试等等。各考点如何有... 当前国家开放大学的各项网络考试和上机考试种类很多,如全国高校网络教育部分公共课统一考试(以下简称统考)、开放教育统设课基于网络考试、省开课基于网络考试、计算机应用基础(新版教材)考试、计算机文化基础考试等等。各考点如何有序、高效、安全地组织好这些考试成为一大难题。考试过程中的考生签到认证入场环节很重要,把好这一关可以极大降低潜在的替考作弊风险,同时也可以有效减少因人工验证带来的误判和效率低下等诸多问题。因此急需设计开发一个适合国开各项机考工作的身份证认证系统,用以解决考生快速签到入场的难题。在Office的EXCEL工作簿中,利用VBA编程访问数据库,实现身份证签到认证工作。系统具有模块化、易于维护和升级、可靠性和安全性等诸多特性。 展开更多
关键词 VBA EXCEL 身份证认证 数据库 机考签到
在线阅读 下载PDF
基于STM32和云平台的智能门锁控制系统的设计 被引量:5
2
作者 陈明忠 陈荣军 《韩山师范学院学报》 2020年第6期39-44,58,共7页
目前的智能门锁应用于短租房和酒店业时,无法实现远程开锁和凭身份证在门锁端登记入住.为了解决这些问题,设计了一种基于云平台的智能门锁控制系统,门锁端以STM32微控制器为核心,外接Wi-Fi模块、身份证识别模块、数字键盘模块,通过Wi-F... 目前的智能门锁应用于短租房和酒店业时,无法实现远程开锁和凭身份证在门锁端登记入住.为了解决这些问题,设计了一种基于云平台的智能门锁控制系统,门锁端以STM32微控制器为核心,外接Wi-Fi模块、身份证识别模块、数字键盘模块,通过Wi-Fi模块与云平台通信.通过手机端访问云平台,成功实现了身份证认证、数字密码认证和手机端远程控制三种开锁方式. 展开更多
关键词 智能门锁 STM32 云平台 身份证认证 远程控制
在线阅读 下载PDF
Membership Proof and Verification in Authenticated Skip Lists Based on Heap 被引量:1
3
作者 Shuanghe Peng Zhige Chen Deen Chen 《China Communications》 SCIE CSCD 2016年第6期195-204,共10页
How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the ... How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees. 展开更多
关键词 authenticated skip list max heap membership proof STACK algorithms
在线阅读 下载PDF
Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications 被引量:2
4
作者 Li Wenmin Wen Qiaoyan Su Qi Zhang Hua Jin Zhengping 《China Communications》 SCIE CSCD 2012年第1期64-72,共9页
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera... To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications. 展开更多
关键词 mobile applications key exchange PASSWORD elliptic curve cryptosystem SECURITY
在线阅读 下载PDF
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks 被引量:3
5
作者 Jiang Qi Ma Zhuo +1 位作者 Ma Jianfeng Li Guangsong 《China Communications》 SCIE CSCD 2012年第10期103-111,共9页
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos... In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks. 展开更多
关键词 AUTHENTICATION ANONYMITY smart card untraceabiliy WSNS
在线阅读 下载PDF
A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States 被引量:2
6
作者 张盛 王剑 +1 位作者 唐朝京 张权 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第8期268-272,共5页
It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocom... It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocombine two or more quantum protocols.To fill this gap,we propose a composed quantum protocol,containing bothquantum identity authentication and quantum key distribution,using squeezed states.Hence,not only the identity canbe verified,but also a new private key can be generated by our new protocol.We also analyze the security under anoptimal attack,and the efficiency,which is defined by the threshold of the tolerant error rate,using Gaussian errorfunction. 展开更多
关键词 quantum key distribution quantum cryptography composed protocol
在线阅读 下载PDF
Provably Secure Self-Certified Signature Schemes with Message Recovery
7
作者 Zhang Shengyuan Tang Fei Lin Changlu Ke Pinhui 《China Communications》 SCIE CSCD 2012年第10期112-119,共8页
To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key... To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes . 展开更多
关键词 digital signature self-certified public key message recovery random oracle model
在线阅读 下载PDF
Attribute-Based Authenticated Group Key Management Protocol for Mobile Peer-to-Peer Network
8
作者 Zhang Guoyin Fu Xiaojing Ma Chunguang 《China Communications》 SCIE CSCD 2012年第10期68-77,共10页
The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network ( MP2... The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network ( MP2PN ). The MP2PN contains some super peers and each super peer controls a subgroup composed of regular peers. An efficient attribute-based signature based on Cipertext-Policy Attribute-Based Encryption (CP-ABE) is proposed and used in this group-key rmnagement protocol to authenticate a peer's at- tributes and identity. A peer can be described by a set of attributes or one unique special identity at- tribute. Peers that have some attributes in common can form a group and conmmnicate with each other anonymously and securely. Any super peer can initiate a group and act as a group controller. The group controller can authenticate a peer's attributes and identity as well as remove malicious peers. Any peer with attributes that rmtches the access structure can join the group and provide its input to form the group key. The proposed protocol pro- vides backward and forward secrecy. The sinmlation results show that this protocol is applicable for mobile devices and can meet the MP2PN requirements of group communication. 展开更多
关键词 MP2PN group key tmnagement attribute-based signature anonymous conmmnica tion
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部