Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone

Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone

Noriyasu Yamamoto, Toshihiko Wakahara
Copyright: © 2012 |Volume: 3 |Issue: 3 |Pages: 12
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781466611771|DOI: 10.4018/jdst.2012070102
Cite Article Cite Article

MLA

Yamamoto, Noriyasu, and Toshihiko Wakahara. "Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone." IJDST vol.3, no.3 2012: pp.15-26. http://doi.org/10.4018/jdst.2012070102

APA

Yamamoto, N. & Wakahara, T. (2012). Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone. International Journal of Distributed Systems and Technologies (IJDST), 3(3), 15-26. http://doi.org/10.4018/jdst.2012070102

Chicago

Yamamoto, Noriyasu, and Toshihiko Wakahara. "Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone," International Journal of Distributed Systems and Technologies (IJDST) 3, no.3: 15-26. http://doi.org/10.4018/jdst.2012070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

To provide a low-cost and simple user attestation method, the authors previously proposed a method with strong authentication using the digital camera of a cellular phone. This method used 2D color code, and as such, there are some process costs like create and decode 2D color code. In this paper, the authors present an improved attestation system using a cellular phone and 2D color code. They compare the performance of the encryption methods and the efficiency of the proposed attestation method, which is confirmed using an experimental prototype system.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.