Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni Jan 2016

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni

Electronic Theses and Dissertations

This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID …


Authentication Of Uncertain Data Based On K-Means Clustering, Levent Ünver, Taflan İmre Gündem Jan 2016

Authentication Of Uncertain Data Based On K-Means Clustering, Levent Ünver, Taflan İmre Gündem

Turkish Journal of Electrical Engineering and Computer Sciences

No abstract provided.


An Improved Security Framework For Web Service-Based Resources, Wenbin Jiang, Hui Xu, Hao Dong, Hai Jin, Xiaofei Liao Jan 2016

An Improved Security Framework For Web Service-Based Resources, Wenbin Jiang, Hui Xu, Hao Dong, Hai Jin, Xiaofei Liao

Turkish Journal of Electrical Engineering and Computer Sciences

Web service-based application has become one of the dominative ones of the Internet. This trend brings more and more security challenges in reliability, confidentiality, and data nonrepudiation, especially in some systems that have massive diversified resources. An improved framework for secure accesses of Web resources is presented and implemented by extending and enhancing the Spring Security framework. It improves the security level of systems for identity authentication, authorized access, and secure transmission. The highly safe authentication is based on the integration of an improved authentication module of Spring Security with a U-key method and a RSA algorithm. For authorized access, …