会议专题

In-depth Analysis of the Security Mechanism for Extended Access Control of Electronic Documents

  More and more countries are beginning to use electronic certificates, which store fingerprints, irises and other private data, and require a reliable authorization control mechanism to ensure the security of personal information.The extended access control (EAC) mechanism published by ICAO is efficient and secure, but the process is complex and difficult to grasp.In order to popularize EAC, the work flow is deeply analyzed, and the key and difficult points of EAC are elaborated in detail, which reduces the difficulty of application and is beneficial to the large-scale popularization.

Electronic credentials Sensitive private data Extended access control (EAC) Key exchange algorithms

Jian SUN Yong-ling FU Sheng-guang LI Wen-peng XU Lin TAN

School of Mechanical Engineering & Automation, Beihang University, Beijing 100191, China;The F.R.I.o School of Mechanical Engineering & Automation, Beihang University, Beijing 100191, China The F.R.I.of Ministry of Public Security, Beijing 100048, China

国际会议

2018 International Conference on Physics, Computing and Mathematical Modeling(PCMM2018)(2018年物理计算和数学建模国际学术会议)

上海

英文

439-445

2018-04-15(万方平台首次上网日期,不代表论文的发表时间)