Abstract
On a remote access environment, strong authentication of the remote user is required since the danger of stealing of authentication devices is very high. In this paper, we propose a secure remote access system appropriate for the remote access environment. Two authentication schemes are used to reduce the danger of stealing of authentication devices. One is the authentication using the public key cryptography. The public key cryptography is stored in the IC card of the remote user and the IC card is locked by the PIN. The another scheme is the one-time pattern authentication which is a sort of challenge and response. Simultaneously, simple key delivery is performed with these authentication protocol. An evaluation of our proposed scheme proves the feasibility and the efficiency as compared with the conventional system using the one-time password and Diffie-Hellman key agreement protocol.
Original language | English |
---|---|
Pages | 868-873 |
Number of pages | 6 |
Publication status | Published - 1998 Dec 1 |
Event | Proceedings of the IEEE GLOBECOM 1998 - The Bridge to the Global Integration - Sydney, NSW, Aust Duration: 1998 Nov 8 → 1998 Nov 12 |
Other
Other | Proceedings of the IEEE GLOBECOM 1998 - The Bridge to the Global Integration |
---|---|
City | Sydney, NSW, Aust |
Period | 98/11/8 → 98/11/12 |
ASJC Scopus subject areas
- Electrical and Electronic Engineering
- Global and Planetary Change