2018
DOI: 10.1051/matecconf/201817303019
|View full text |Cite
|
Sign up to set email alerts
|

Research on User Identity Authentication Based on Two-way Confirmation in Data Transmission

Abstract: User identity authentication is the foundation of data transmission in the complicated network environment. Moreover, the key issue is the effective identity authentication of both sides in data transmission. An authentication method for user identity based on two-way confirmation in data transmission is proposed in this paper. The public key, private key, information of traditional identity authentication, one-time transmission key, timestamp, authentication lifecycle for timestamp and other authentication el… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 6 publications
(7 reference statements)
0
2
0
Order By: Relevance
“…The significance of network security is revealed by the fact that numerous devices are connected to a single network. The use of two-factor authentication in robotics should be inevitable in order to provide this security [15]. Data can be exchanged at a short distance with a low bandwidth by using NFC technology.…”
Section: Fig 1 Rsa Securidmentioning
confidence: 99%
See 1 more Smart Citation
“…The significance of network security is revealed by the fact that numerous devices are connected to a single network. The use of two-factor authentication in robotics should be inevitable in order to provide this security [15]. Data can be exchanged at a short distance with a low bandwidth by using NFC technology.…”
Section: Fig 1 Rsa Securidmentioning
confidence: 99%
“…NFC has begun to be used especially in cars, at home street gates because the number of NFC-enabled devices has increased. At this point, smaller NFC controllers are used to make users more secure (NFC Controller Chip on mobile phones) [15].…”
Section: Fig 2 Nfc Working Principlementioning
confidence: 99%