期刊文献+

异源码字信息无序交融机制及其应用

Disordered Fusion Mechanism of Heterologic Code Word Information and Its Application
下载PDF
导出
摘要 目前利用单模态密码进行身份认证存在输入方式单一、安全性低等缺点。为此,提出一种异源码字可无序交融输入的方法。建立异类模态密码码字产生硬件的融合机制,给出异类模态密码码字信息归一化格式,为不同的模态信息设计不同的前置处理和密码码字分类等算法,通过异源码字公共单元实现异类模态密码码字的无序交融。基于密码键盘与黑箱子指书2类模态码字的无序交融应用实例表明,该机制可以较好地用于多模态密码输入系统。 Single-mode password authentication has kinds of disadvantages, like single input mode and low security. This paper proposes a method to disordered fusion input for heterologic code. It builds fusion mechanism based on hardware generating of heterologic model code, gives normalized form of heterologic model code information, and designs the corresponding algorithm, like different pre-processing and classification of password code, for different model information. Disordered fusion of heterogeneous model code is implemented through public unit of heterologic code. Application of disordered fusion based on password keyboard model and black box model show that the mechanism is suitable for multi-mode password input system.
出处 《计算机工程》 CAS CSCD 2012年第21期133-137,共5页 Computer Engineering
基金 湖南省高校创新平台开放基金资助项目(09K040) 湖南省"十二五"重点学科建设基金资助项目
关键词 多模态密码输入系统 异源码字 无序交融 密码键盘 黑箱子指书盘 multi-mode password input system heterologic code word disordered fusion password keyboard black box keyboard
  • 相关文献

参考文献7

二级参考文献34

  • 1AGRE J, CLARE L An integrated architecture for cooperative sensing networks[J]. IEEE Transactions on Computer, 2000, 33 (5) :106--108.
  • 2KULIK J, RABINER W, BALAKRISHMAN H. Adaptive protocolsfor information dissemination in wireless sensor networks[C]// Pro-ceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, 1999:174--185.
  • 3INTANAGONWIWAT C,GOVINDAN R,ESTRIN D. Directed diffusion:A scalable and robUst communication paradigm for sensor networks[C]//IProc 4th ACM International Conference on Mobile Computing and Networking(Mobicom'98) ,2000.
  • 4VIKRAM S, CARLA-FABIANA C, PAVAN S,et al. Optimal rate allocation for energy-efficient multipath routing in wireless ad hoe networks[J]. IEEE Transactions on Wireless Communications,2004, 3 (3):891--899.
  • 5SHANG Y,SHI H C. Coverage and energy tradeoff in density control on sensor networks[C]//11th International Conference on Parallel and Distributed Systems, 2005:564--570.
  • 6CARLE J,GALLAIS A, SIMPLOT-RYL D. Preserving area coverage in wireless sensor networks by using surface coverage relay Dominating sets[C]. Proceedings of IEEE symposium on Computers and communications, 2005:347-- 352.
  • 7ALBERTO E. cerpa and deborah Estrin, Ascent:adaptive self-configuring sensor networks topologies[J]. IEEE Transactions on Mobile Computing, 2004,3 (3) : 27Z-- 285.
  • 8WANG X,XING G,ZHANG Y. Integrated coverage and connectivity configuration in wireless sensor networks[C] // Akyildiz I, Estion D. Proe of the ACM int'l conf. on embedded networked sensor systems. New york:ACM press,2003.28--39.
  • 9Goldberg J,Hagman J,Sazawal V.Doodling Our Way to Better Authentication[C]//Proceedings of Human Factors in Computing Systems (CHI),Minneapolis,Minnesota,USA,2002.
  • 10Syukri A F,Okamoto E,Mambo M.A User Identification System Using Signature Written with Mouse[C]//Third Australasian Conference on Information Security and Privacy (ACISP):Springer-Verlag Lecture Notes in Computer Science (1438),1998:403-441.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部