From Differential Cryptoanalysis to Ciphertext-Only Attacks
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
A Ubiquitous Information Technology Framework Using RFID to Support Students' Learning
ICALT '05 Proceedings of the Fifth IEEE International Conference on Advanced Learning Technologies
Building a Smart University Using RFID Technology
CSSE '08 Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 05
Automatic Control of Students' Attendance in Classrooms Using RFID
ICSNC '08 Proceedings of the 2008 Third International Conference on Systems and Networks Communications
AWGN based seed for random noise generator in ParseKey+
Proceedings of the 2nd international conference on Security of information and networks
Energy comparison of AES and SHA-1 for ubiquitous computing
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Strong authentication with mobile phone
ISC'12 Proceedings of the 15th international conference on Information Security
Hi-index | 0.00 |
Currently RFID authentication systems rely only on matching tag ID with the one kept in database. Additionally, an alphanumerical password might be matched as extra security. However, tag ID and information inside can be compromised. Therefore, a more secure scheme is required in order to enhance safety of access control through RFID tags in particularly highly secure environments such as secure virtual meetings or authentication and access control to access high security locals. We wish to present attendance control system which is more like access control in general as an application of our novel security enhancement on RFID based access control systems. The security enhancement utilizes partial ParseKey+ multi-way authentication scheme. ParseKey+ scatters randomly divided sub-keys into uniformly distributed noise. Generated file is encrypted using AES256 and then it is written into RFID device. Each successful login changes the key and its trace kept in DB in addition to updating the device for future login.