Unified Identity Authentication Based on D-S Evidence Theory

Jiawei Wang,
Zhenjiang Zhang,
Shih-Chen Wang,
Sheng-Lung Peng,
Yuqun Rui,

Abstract


Nowadays, the number of cases that executed cooperation with others in the world is increasing. Some major cases and some cases that are connected with several areas are settled in several courts. For the particularity of this kind of cases, coordinated command across regions and levels should play a more important role. Under this background, every law enforcer should be able to be authenticated anytime and anywhere, and can access to the system easily. In this case, establishing a kind of unified identity authentication is essential. This paper come up with a unified identity authentication based on D-S evidence theory, merging several kinds of authentication methods to complete the identity authentication.


Citation Format:
Jiawei Wang, Zhenjiang Zhang, Shih-Chen Wang, Sheng-Lung Peng, Yuqun Rui, "Unified Identity Authentication Based on D-S Evidence Theory," Journal of Internet Technology, vol. 21, no. 2 , pp. 535-542, Mar. 2020.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com