Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Securing mobile access with interactive image code and image key encryption

Full metadata record
DC Field Value Language
dc.contributor.authorBae, Mungyu-
dc.contributor.authorLee, Jiyeon-
dc.contributor.authorLee, Suk Kyu-
dc.contributor.authorKim, Hwangnam-
dc.date.accessioned2021-09-03T17:00:42Z-
dc.date.available2021-09-03T17:00:42Z-
dc.date.created2021-06-16-
dc.date.issued2016-11-10-
dc.identifier.issn1939-0114-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/86843-
dc.description.abstractIn this paper, we propose a novel anti-phishing scheme, image code-based anti-phishing scheme (ICAP), for securing mobile access through an image code. The proposed scheme can protect mobile users from phishing attack and side-glance attack which are threats to mobile environment. The proposed scheme employs the image code as the interaction between a mobile device and a server. This image code can maintain the quality of user-interface and protect the user from the side-glance attack. The proposed scheme basically uses the quick response code, which is a famous image code and has the human-unreadable property. Moreover, we propose two novel algorithms based on image code to improve our basic scheme; image key encryption, and image code identity-based encryption. The proposed scheme can choose one of two algorithms for its objective, and each algorithm has its own advantage. Image key encryption is a symmetric algorithm that can improve the transmission and encryption delay and reduces the power consumption. Image code identity-based encryption is an identity-based encryption algorithm which has the advantage of identity-based encryption. Our implementation result shows that our ICIP scheme can defend the phishing attack and side-glance attack, and shows the superiority of delay, power consumption, and accuracy. Copyright (C) 2016 John Wiley & Sons, Ltd.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.subjectUSERS-
dc.titleSecuring mobile access with interactive image code and image key encryption-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Hwangnam-
dc.identifier.doi10.1002/sec.1548-
dc.identifier.scopusid2-s2.0-84978141538-
dc.identifier.wosid000389250100031-
dc.identifier.bibliographicCitationSECURITY AND COMMUNICATION NETWORKS, v.9, no.16, pp.3412 - 3427-
dc.relation.isPartOfSECURITY AND COMMUNICATION NETWORKS-
dc.citation.titleSECURITY AND COMMUNICATION NETWORKS-
dc.citation.volume9-
dc.citation.number16-
dc.citation.startPage3412-
dc.citation.endPage3427-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusUSERS-
dc.subject.keywordAuthormobile security-
dc.subject.keywordAuthoranti-phishing-
dc.subject.keywordAuthorimage code-
dc.subject.keywordAuthorimage key encryption-
dc.subject.keywordAuthoridentity-based encryption-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > School of Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Hwang nam photo

Kim, Hwang nam
공과대학 (전기전자공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE