Base64 Encode Conversion Algorithm  

Base64 Encode Conversion Algorithm  

Source publication
Article
Full-text available
This article designs a new mobile-phone entrance guard system, uses the encryption two-dimensional code for identity authentication. Different from other similar products in the market, this system does not rely on specialized mobile phone card or NFC (near field communication) module. It can be directly realized through mobile-phone software, and...

Context in source publication

Context 1
... that, at the head of every byte of 6 bits adds two zero, formed to every byte of 8 bits. Each byte value is replaced by the character of the coding table in Figure 6. The characters of this coding table consist of the English characters, figures and common symbols. ...

Citations

... This section briefs the existing studies that have been carried out towards addressing the security issues in NFC-based device, applications, and services. The work of Jianli et al. [8] designed an security system model for NFC device using two dimensional code encryption and found that it provides the boot passward for the mobile phone. Senthil Kumar and Mathivanan [9] presented the password protected NFC card which provides the personal code and is secure one. ...
Article
Full-text available
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between user-experience and security demands exists. The Near Field Communication or NFC is one such communication trend which is effectively adopted by the user worldwide to make touchless operation using their mobile device. Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are not so difficult to compromise to result in collateral damage to user's resources. Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency. This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap. © Copyright 2018 Institute of Advanced Engineering and Science. All rights reserved.