To provide seamless Internet services, most public buildings, including coffee shops, airports, and libraries, temporary personal computers are offered to users for network access. This has led to a potential risk that the secret information of the user may be leaked out once these temporary computers have been affected by Trojans. Generally, the service provider checks the authority of a user according to a series of authentication procedure. While a user enters the verification token into the public computers, an attacker may apply a key-logger to steal the password or personal information. In this article, we have first introduced the visual secret sharing technique with arbitrary-angle stacking to design an auxiliary authorization protocol. According to the stacked one-time password, users can have the access to network services without keying any secret information into the public computers. Moreover, the efficiency of AAVSS is favorable to resource-constrained mobile device.
為了持續優化網站功能與使用者體驗,本網站將Cookies分析技術用於網站營運、分析和個人化服務之目的。
若您繼續瀏覽本網站,即表示您同意本網站使用Cookies。