完整後設資料紀錄
DC 欄位語言
dc.contributor.author徐, 熊健 Jr
dc.contributor.author黃, 昱霖 Jr
dc.contributor.author莊, 竣傑 Jr
dc.contributor.author賴, 阿福 Jr
dc.date.accessioned2011-03-25T00:44:14Z
dc.date.accessioned2020-05-18T03:24:58Z-
dc.date.available2011-03-25T00:44:14Z
dc.date.available2020-05-18T03:24:58Z-
dc.date.issued2011-03-25T00:44:14Z
dc.date.submitted2009-11-28
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/30163-
dc.description.abstractThe notion of visual authentication was first devised by Naor and Pinkas in 1997. They addressed that a straightforward application of a naïve visual cryptographic scheme in the authentication requirement is vulnerable and proposed a scheme incorporating visual cryptography with an additional encryption algorithm to achieve visual authentication. We develop a simple visual two-secret sharing scheme, without any other encryption algorithm, to accomplish the same goal in this paper. Our approach possesses the advantages of low-technology and portable which enable the authentication to be validated in a visual sense. A simple scenario of utilizing our scheme in the authentication phrase of E-payment via modern mobile cell phones is designed to show the feasibility of our ideas.
dc.description.sponsorshipNational Taipei University,Taipei
dc.format.extent8p.
dc.relation.ispartofseriesNCS 2009
dc.subjectVisual authentication
dc.subjectvisual cryptography visual two-secret sharing
dc.subjectauthentication
dc.subjectcell phone
dc.subject.otherWorkshop on Cryptography and Information Security
dc.titleVisual Authentication on Mobile Devices
dc.title.alternative行動裝置上的視覺認證
分類:2009年 NCS 全國計算機會議

文件中的檔案:
檔案 描述 大小格式 
CI0706.pdf1.19 MBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。