期刊文献+

基于图像认证的个性化用户认证方法研究

Study on Personal User Authentication Method Based on Photographic Authentication
下载PDF
导出
摘要 普适计算是未来的计算模式,人们可以随时、随地获得满意的服务。结合未来普适计算环境下设备的多样性和用户的个性化需求,对图像认证方法进行了扩展进而提出个性化认证方案,图像认证方法利用用户对图片的识别能力验证登录者是否为用户本人,从而可以抵抗重放攻击。该认证方案使用一种组合办法既减少每次认证暴露给第三方的信息,又提高了安全性,同时可提供多种媒体形式供用户识别,实验结果与分析表明该方法是可行的,用户可以接受这种认证方式。 Pervasive computing is a computing paradigm for future, in which a user can get satisfied service at anytime and anywhere. Considering trends of user personalization and device diversity, a personal user authentication method by extending the photographic authentication method is proposed. Photographic authentication identifies the right user by user's ability to recognize personal photographs, so it can withstand replay attacks. This method can reduce information exposure and enhance system security with a combinatorial choosing objects scheme. Experimental results and security analysis show that this method is acceptable and viable. It can reasonably withstand replay attacks.
出处 《计算机科学》 CSCD 北大核心 2007年第7期84-85,89,共3页 Computer Science
基金 重庆市自然科学基金重点项目(No2005BA2003) 重庆市教委科学技术研究项目(编号KJ050509)资助 重庆市教委骨干教师资助计划资助
关键词 图像认证 用户认证 基于知识的认证 网络安全 普适计算 Photographic authentication, User authentication, Knowledge-based authentication, Network security, Pervasive computing
  • 相关文献

参考文献5

  • 1Pering T, et al. Photogranphic Authentication through Untrusted Terminals. IEEE PERVASIVE computing, 2003,2 (1) : 30- 36
  • 2Dhamija R, Perrig A. DejaVu: A User Study Using Images for Authentication. In: Proc. 9th Usenix Security Syrup. , Usenix, Aug. 2000. 45-58
  • 3徐光祐,史元春,谢伟凯.普适计算[J].计算机学报,2003,26(9):1042-1050. 被引量:258
  • 4王悦,岳玮宁,王衡,董士海.手持移动计算中的多通道交互[J].软件学报,2005,16(1):29-36. 被引量:29
  • 5Deb S, Zhang Yanchun. An overview of content-based image retrieval techniques. In: 18th International Conference on Advanced Information Networking and Applications, Volume 1, 2004. 59-64

二级参考文献62

  • 1董士海 王坚 等.人机交互和多通道用户界面[M].北京:科学出版社,1999..
  • 2Abowd G D, Dey A K, Brown P J, Davies N, Smith M,Steggles P. Towards a better understanding of context and context-awareness. In: Gellersen H Wed. Handheld and Ubiquitous Computing. Berlin: Springer, 1999. 304-307.
  • 3Castro P, Muntz R. Managing context data for smart spaces.IEEE Personal Communications, 2000, 7(5): 44-46.
  • 4Weiser M. The computer for the twenty-first century. Scientific American, 1991, 265(3): 94-104.
  • 5Dertouzos M. The future of computing. Scientific American,1999, 282(3): 52-63.
  • 6Norman D. The Invisible Computer. Cambridge, Mass: MIT Press, 1999.
  • 7Garlan D, Siewiorek D P, Smailagic A, Steenkiste P. Project aura: Toward distraction-free pervasive computing. IEEE Pervasive Computing, 2002, 1(4-6): 22-31.
  • 8Salz P. The disappearing computer. Time Europe, 2000, 155(8) : 1-8.
  • 9Vernier F, Leash N, Shen C. Visualization techniques for circular tabletop interfaces. MERL Cambridge Research, MA,USA:Technical Report: TR2002-01, 2002.
  • 10Xie Wei-Kai, Shi Yuan-Chun, Xu Guan-You. Smart classroom—— An intelligent environment for tele-education. In:Proceedings of the 2nd IEEE Pacific-Rim Conference on Multimedia, Beijing, China, 2001. 662-668.

共引文献284

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部