Skip to main content
placeholder image

Securing shared systems

Conference Paper


Abstract


  • With increasing reliance on new and interactive technologies, a challenge producers face is the requirement of a secure system to control users of their cooperative designs or applications to reap economic benefit. An authentication code is the series of letters and numbers, often disclosed after purchasing a product or service and that allows access for that user. This paper provides insight into the generation and verification of existing authentication codes and proposes a new scheme, which uses cryptography to embed mathematical structure within the codes to better protect cooperative applications. The proposed method uses a changing key based on a secret key and a random number, and symmetrical block cipher.

Publication Date


  • 2016

Citation


  • Li, M., Susilo, W., & Tonien, J. (2016). Securing shared systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9929 LNCS (pp. 194-201). doi:10.1007/978-3-319-46771-9_26

Scopus Eid


  • 2-s2.0-84994126431

Start Page


  • 194

End Page


  • 201

Volume


  • 9929 LNCS

Abstract


  • With increasing reliance on new and interactive technologies, a challenge producers face is the requirement of a secure system to control users of their cooperative designs or applications to reap economic benefit. An authentication code is the series of letters and numbers, often disclosed after purchasing a product or service and that allows access for that user. This paper provides insight into the generation and verification of existing authentication codes and proposes a new scheme, which uses cryptography to embed mathematical structure within the codes to better protect cooperative applications. The proposed method uses a changing key based on a secret key and a random number, and symmetrical block cipher.

Publication Date


  • 2016

Citation


  • Li, M., Susilo, W., & Tonien, J. (2016). Securing shared systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9929 LNCS (pp. 194-201). doi:10.1007/978-3-319-46771-9_26

Scopus Eid


  • 2-s2.0-84994126431

Start Page


  • 194

End Page


  • 201

Volume


  • 9929 LNCS