PROVERA IDENTITETA KORISNIKA KORIŠĆENJEM QR KODA
Ključne reči:
QR kod, bezbednost,, 2FA, Dvostruka verifikacija identiteta, C4 model
Apstrakt
U radu je opisan sistem za dvostruku verifikaciju identiteta korisnika skeniranjem QR koda, arhitektura aplikacije, komunikacija, model komponenti.
Reference
[1] Brian P. Sutton “The Effects of Technology in Society and Education„ 2013 https://digitalcommons.brockport.edu/cgi/viewcontent.cgi?article=1196&context=ehd_theses (pristupljeno u januaru 2021.)
[2] Ako Muhammad Abdullah, Roza Hikmat Hama Aziz “Evaluating the Use of Quick Response (QR) Code at Sulaimani University Libraries” 2014
https://www.researchgate.net/publication/270879583 (pristupljeno u januaru 2021.)
[3] Zhongpai Gao, Guangtao Zhai and Chunjia Hu “The Invisible QR Code” 2015 https://www.researchgate.net/publication/309350866 (pristupljeno u januaru 2021.)
[4] Shuai Chen, “Evaluation of Two-Dimensional Codes for Digital Information Security in Physical Documents“, https://scholarworks.umass.edu/cgi/viewcontent.cgi?article=1235&context=masters_theses_2 (pristupljeno u januaru 2021.)
[5] Jori Kymäläinen, “IMPLEMENTING TWO-FACTOR AUTHENTICATION”, 2018 https://www.theseus.fi/bitstream/handle/10024/145670/Thesis_Jori_Kymalainen.pdf?sequence=1&isAllowed=y (pristupljeno u januaru 2021.)
[6] Google, American company https://www.britannica.com/topic/Google-Inc (pristupljeno u januaru 2021.)
[7] About Microsoft, https://www.microsoft.com/en-us/about (pristupljeno u januaru 2021.)
[8] Okta Verify, https://help.okta.com/en/prod/Content/Topics/Mobile/okta-verify-overview.htm (pristupljeno u januaru 2021.)
[9] Mahmoud A. eltatar, “Modified Advanced Encryption Standard Algorithm for Reliable Real-Time Communications” Dec/2017 https://library.iugaza.edu.ps/thesis/123123.pdf (pristupljeno u januaru 2021.)
[10] ZXing image processing library, Javadoc https://zxing.github.io/zxing/apidocs/ (pristupljeno u januaru 2021.)
[2] Ako Muhammad Abdullah, Roza Hikmat Hama Aziz “Evaluating the Use of Quick Response (QR) Code at Sulaimani University Libraries” 2014
https://www.researchgate.net/publication/270879583 (pristupljeno u januaru 2021.)
[3] Zhongpai Gao, Guangtao Zhai and Chunjia Hu “The Invisible QR Code” 2015 https://www.researchgate.net/publication/309350866 (pristupljeno u januaru 2021.)
[4] Shuai Chen, “Evaluation of Two-Dimensional Codes for Digital Information Security in Physical Documents“, https://scholarworks.umass.edu/cgi/viewcontent.cgi?article=1235&context=masters_theses_2 (pristupljeno u januaru 2021.)
[5] Jori Kymäläinen, “IMPLEMENTING TWO-FACTOR AUTHENTICATION”, 2018 https://www.theseus.fi/bitstream/handle/10024/145670/Thesis_Jori_Kymalainen.pdf?sequence=1&isAllowed=y (pristupljeno u januaru 2021.)
[6] Google, American company https://www.britannica.com/topic/Google-Inc (pristupljeno u januaru 2021.)
[7] About Microsoft, https://www.microsoft.com/en-us/about (pristupljeno u januaru 2021.)
[8] Okta Verify, https://help.okta.com/en/prod/Content/Topics/Mobile/okta-verify-overview.htm (pristupljeno u januaru 2021.)
[9] Mahmoud A. eltatar, “Modified Advanced Encryption Standard Algorithm for Reliable Real-Time Communications” Dec/2017 https://library.iugaza.edu.ps/thesis/123123.pdf (pristupljeno u januaru 2021.)
[10] ZXing image processing library, Javadoc https://zxing.github.io/zxing/apidocs/ (pristupljeno u januaru 2021.)
Objavljeno
2021-07-04
Sekcija
Elektrotehničko i računarsko inženjerstvo