{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:10:15Z","timestamp":1654135815033},"reference-count":12,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7,1]]},"abstract":"<p>To provide a low-cost and simple user attestation method, the authors previously proposed a method with strong authentication using the digital camera of a cellular phone. This method used 2D color code, and as such, there are some process costs like create and decode 2D color code. In this paper, the authors present an improved attestation system using a cellular phone and 2D color code. They compare the performance of the encryption methods and the efficiency of the proposed attestation method, which is confirmed using an experimental prototype system.<\/p>","DOI":"10.4018\/jdst.2012070102","type":"journal-article","created":{"date-parts":[[2013,2,5]],"date-time":"2013-02-05T22:20:00Z","timestamp":1360102800000},"page":"15-26","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone"],"prefix":"10.4018","volume":"3","author":[{"given":"Noriyasu","family":"Yamamoto","sequence":"first","affiliation":[{"name":"Fukuoka Institute of Technology, Japan"}]},{"given":"Toshihiko","family":"Wakahara","sequence":"additional","affiliation":[{"name":"Fukuoka Institute of Technology, Japan"}]}],"member":"2432","reference":[{"key":"jdst.2012070102-0","doi-asserted-by":"crossref","unstructured":"Davaanaym, B., Lee, Y. S., Lee, H. J., Lee, S. G., & Lim, H. T. (2009). A ping pong based one-time-passwords authentication system. In Proceedings of the Fifth International Joint Conference on Networked Computing and Advanced Information Management (pp. 574-579).","DOI":"10.1109\/NCM.2009.247"},{"key":"jdst.2012070102-1","doi-asserted-by":"crossref","unstructured":"Kumar, A., Hanmandlu, M., Madasu, V. K., & Lovell, B. C. (2009). Biometric authentication based on infrared thermal hand vein patterns. In Proceedings of the Conference on Digital Image Computing: Techniques and Applications (pp. 331-338).","DOI":"10.1109\/DICTA.2009.63"},{"key":"jdst.2012070102-2","unstructured":"Mobile-OTP. (2010). Strong two-factor authentication with mobile phones. Retrieved from http:\/\/motp.sourceforge.net\/"},{"key":"jdst.2012070102-3","doi-asserted-by":"crossref","unstructured":"Qu, Z., Wang, T., Zheng, R., & Liu, Y. (2010). An identity authentication system based on face biometrics and eye localization. In Proceedings of the International Conference on Measuring Technology and Mechatronics Automation (Vol. 1, pp. 479-483).","DOI":"10.1109\/ICMTMA.2010.686"},{"key":"jdst.2012070102-4","doi-asserted-by":"crossref","unstructured":"Takamizawa, H., & Kaijiri, K. (2006). Reliable authentication method by using cellular phones in WBT. In Proceedings of the International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (p. 200).","DOI":"10.1109\/ICNICONSMCL.2006.184"},{"issue":"40","key":"jdst.2012070102-5","first-page":"211","article-title":"Proposal of Web application attestation information management system using cellular phone.","volume":"110","author":"Y.Tetsuka","year":"2010","journal-title":"IEICE Technical Reports"},{"key":"jdst.2012070102-6","doi-asserted-by":"crossref","unstructured":"Thinn, K. K. (2009). Three way challenge-response authentication in smart card using elliptic curve cryptosystem. In Proceedings of the International Conference on Advanced Computer Control (pp. 777-780).","DOI":"10.1109\/ICACC.2009.141"},{"key":"jdst.2012070102-7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.31"},{"key":"jdst.2012070102-8","doi-asserted-by":"crossref","unstructured":"Watanabe, R., & Tanaka, T. (2009). Federated authentication mechanism using cellular phone - collaboration with OpenID. In Proceedings of the Third International Conference on Information Technology: New Generations (pp. 435-442).","DOI":"10.1109\/ITNG.2009.111"},{"issue":"160","key":"jdst.2012070102-9","first-page":"111","article-title":"Improvement of password authentication that uses cellular phone and two dimension bar code.","volume":"109","author":"N.Yamamoto","year":"2009","journal-title":"IEICE Technical Reports"},{"key":"jdst.2012070102-10","doi-asserted-by":"crossref","unstructured":"Yamamoto, N., & Wakahara, T. (2010). A user attestation system using a cellular phone equipped with digital camera. In Proceedings of the International Conference on P2P, Parallel Grid, Cloud and Internet Computing (pp. 431-435).","DOI":"10.1109\/3PGCIC.2010.72"},{"key":"jdst.2012070102-11","doi-asserted-by":"crossref","unstructured":"Yamamoto, N., & Wakahara, T. (2011). Improvement of encryption processing speed for a user attestation system using a cellular phone. In Proceedings of the 14th International Conference on Network-Based Information Systems (pp. 602-606).","DOI":"10.1109\/NBiS.2011.101"}],"container-title":["International Journal of Distributed Systems and Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=67555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:40:33Z","timestamp":1654134033000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdst.2012070102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,7,1]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jdst.2012070102","relation":{},"ISSN":["1947-3532","1947-3540"],"issn-type":[{"value":"1947-3532","type":"print"},{"value":"1947-3540","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,1]]}}}