,A New Key-lock Method for User Authentication and Access Control

来源 :中国电子杂志(英文版) | 被引量 : 0次 | 上传用户:monowing
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.
其他文献
Using a precise probability expres-sion under excessive microwave power condition, theRamsey pattes in a cesium atomic beam frequencystandard with Ramsey separa
A modified LMS algorithm for noise-control is suggested after a mathematical model ofsound-cancellation is established, on the basis of thesound wave interferen
In this paper, an efficient unlinkable, divisible electronic cash based on bit commitment scheme is proposed. The complexity of every protocol in our scheme is
A method of embedding a digital wa-termark image in video is proposed in this paper.Bymultiresolution signal decomposing,the decomposedwatermark image with diff
A new technique which combinesthe generalized network formulation along with theboundary integral method and the connection algo-rithm is proposed to deal with
A physical optics (PO) field anal-ysis is made for the scattering from polygonal flatwith anisotropic impedance layer.Numerical exam-ples are shown to highlight
As the ordinary low resolution radarcan not distinguish the radar target both at range andazimuth,if we apply the technology of inverse syn-thetic aperture rada
Performance degradation due to theinterplay between nodes crosstalk and nonlinear prop-agation in all optical networks is studied in this paper,and an analytica
A consecutive-k-out-of-n: G system with n linearly arranged i. i.d. components is examined. This paper gives an exact formula for computing the system reliabili
随着经济的发展,个人所有的财产将会越来越多,但是人的生命是有限的,不可避免的面临继承问题。继承的最大目的就是让子孙后代生活有保障,有些情况下继承人没有能力或者能力不足管