By Topic

Two integrated schemes of user authentication and access control in a distributed computer network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jan, J.-K. ; Inst. of Appl. Math., Nat. Chung-Hsing Univ., Taichung, Taiwan ; Tseng, Y.-M.

With the growth in the scale of network technologies, security has become a major concern and a limiting factor. Computer networks provide convenient procedures for users operating at remote places. However, an intruder can easily access and intercept information transmitted in an open channel. Two integrated schemes for user authentication and access control are proposed, which are mechanisms used to provide for the protection of privacy and security in a distributed environment. One scheme is a dynamic approach which provides an efficient updating process for the modification of access rights. The second scheme allows servers to simplify verification processes for multiple access requests of a user at the same time. Both schemes are noninteractive approaches in which security is based on the computational difficulty of solving the discrete logarithm problem. Compared with other schemes proposed previously, the schemes are more secure and efficient and suitable for applications in a distributed environment. Intruders cannot derive secret information from public information. Intruders are not able to acquire the passwords of users from previously intercepted messages. By applying a time stamp, the schemes can withstand the replaying attack

Published in:

Computers and Digital Techniques, IEE Proceedings -  (Volume:145 ,  Issue: 6 )