The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Pada tahun 1998, Jan dan Tseng mencadangkan dua skim bersepadu pengesahan pengguna dan kawalan capaian yang boleh digunakan untuk melaksanakan sistem perlindungan dalam sistem komputer teragih. Makalah ini akan menganalisis keselamatan kedua-dua skim dan menunjukkan bahawa penceroboh boleh dengan mudah memalsukan log masuk, diterima dan log masuk sebagai pengguna sah dan mengakses sumber sistem. Kami kemudiannya akan mencadangkan skim yang diubah suai untuk menahan serangan yang dicadangkan kami.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Narn-Yih LEE, "Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network" in IEICE TRANSACTIONS on Information,
vol. E85-D, no. 2, pp. 386-391, February 2002, doi: .
Abstract: In 1998, Jan and Tseng proposed two integrated schemes of user authentication and access control which can be used to implement a protection system in distributed computer systems. This paper will analyze the security of both schemes and show that an intruder can easily forge a login, be accepted and logged in as a legal user, and access system resources. We will then propose a modified scheme to withstand our proposed attacks.
URL: https://global.ieice.org/en_transactions/information/10.1587/e85-d_2_386/_p
Salinan
@ARTICLE{e85-d_2_386,
author={Narn-Yih LEE, },
journal={IEICE TRANSACTIONS on Information},
title={Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network},
year={2002},
volume={E85-D},
number={2},
pages={386-391},
abstract={In 1998, Jan and Tseng proposed two integrated schemes of user authentication and access control which can be used to implement a protection system in distributed computer systems. This paper will analyze the security of both schemes and show that an intruder can easily forge a login, be accepted and logged in as a legal user, and access system resources. We will then propose a modified scheme to withstand our proposed attacks.},
keywords={},
doi={},
ISSN={},
month={February},}
Salinan
TY - JOUR
TI - Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network
T2 - IEICE TRANSACTIONS on Information
SP - 386
EP - 391
AU - Narn-Yih LEE
PY - 2002
DO -
JO - IEICE TRANSACTIONS on Information
SN -
VL - E85-D
IS - 2
JA - IEICE TRANSACTIONS on Information
Y1 - February 2002
AB - In 1998, Jan and Tseng proposed two integrated schemes of user authentication and access control which can be used to implement a protection system in distributed computer systems. This paper will analyze the security of both schemes and show that an intruder can easily forge a login, be accepted and logged in as a legal user, and access system resources. We will then propose a modified scheme to withstand our proposed attacks.
ER -