2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery 2011
DOI: 10.1109/cyberc.2011.55
|View full text |Cite
|
Sign up to set email alerts
|

Physical Access Control Based on QR Code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 1 publication
0
11
0
1
Order By: Relevance
“…They are widely used in mobile phones (e.g., applications of instance messaging, user login, and mobile payment). QR codes can not only store large information, but also have error-correction ability [21]. In addition, QR codes have high recognition rate, and there are massive algorithm libraries to invoke [22].…”
Section: Related Workmentioning
confidence: 99%
“…They are widely used in mobile phones (e.g., applications of instance messaging, user login, and mobile payment). QR codes can not only store large information, but also have error-correction ability [21]. In addition, QR codes have high recognition rate, and there are massive algorithm libraries to invoke [22].…”
Section: Related Workmentioning
confidence: 99%
“…보안성 분석 Sniffing [4] , Password Guessing Attack [13] , Replay 표 2에 DTOTP 시스템과 기존 OTP [14] , 이중 인 증의 또 다른 방식인 SUAN [14] 의 주요 특성을 비 교한다.…”
Section: ⅳ 검토 및 분석unclassified
“…The last four years alone various works have proposed authentication systems combining QR codes and one-time passwords. They include systems for online banking [6], [7], health systems [8], access control [9], web applications [10], personal smartphones [11]- [14], and voting systems [15]. None of these proposals offers hands-free or continuous authentication to users.…”
Section: Introductionmentioning
confidence: 99%