Results 1 - 10
of
213
One-Time Biometric Token based Authentication
"... Widely used online commerce systems require an user to submit his sole banking credentials or credit card details for availing desired services, thus involving high risks with untrusted service providers. Often used one-time password based systems provide additional transaction security, but are sti ..."
Abstract
- Add to MetaCart
, but are still incapable of differentiating between a genuine user trying to authenticate or an adversary with stolen creden-tials. This brings out a strong need for biometrics based one-time password systems. In this paper we propose a one-time biometric token based authentication protocol which works within
A secure hash-based strong-password authentication protocol using one-time public-key cryptography
- Journal of Information Science and Engineering
"... Secure communication is an important issue in networks and user authentication is a very important part of the security. Several strong-password authentication protocols have been introduced, but there is no fully secure authentication scheme that can resist all known attacks. We propose enhanced se ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Secure communication is an important issue in networks and user authentication is a very important part of the security. Several strong-password authentication protocols have been introduced, but there is no fully secure authentication scheme that can resist all known attacks. We propose enhanced
Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol *
"... In 2008, Kim-Koç proposed a secure hash-based strong-password authentication protocol using one-time public key cryptography. He claimed that the protocol was secure against guessing, stolen-verifier, replay, denial-of-service, and impersonation attacks. However, we show that the protocol is vulnera ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
In 2008, Kim-Koç proposed a secure hash-based strong-password authentication protocol using one-time public key cryptography. He claimed that the protocol was secure against guessing, stolen-verifier, replay, denial-of-service, and impersonation attacks. However, we show that the protocol
Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy
"... Abstract. In 2008, Tang and Wu designed a one-time alias mechanism for protecting the mobile privacy of a user. Recently, Youn and Lim proposed an improved delegation-based authentication protocol to provide private roaming service. In this article, we show that a link between requests may disclose ..."
Abstract
- Add to MetaCart
Abstract. In 2008, Tang and Wu designed a one-time alias mechanism for protecting the mobile privacy of a user. Recently, Youn and Lim proposed an improved delegation-based authentication protocol to provide private roaming service. In this article, we show that a link between requests may disclose
Weaknesses of a Dynamic ID Based Remote User Authentication Protocol for Multi-Server Environment
, 2013
"... Currently, smart card based remote user authentication schemes have been widely adopted due to their low cost and convenient portability. With the purpose of using various different internet ser-vices with single registration and to protect the users from being tracked, various dynamic ID based mult ..."
Abstract
- Add to MetaCart
multi-server authentication protocols have been proposed. Recently, Li et al. proposed an efficient and secure dynamic ID based authentication protocol using smart cards. They claimed that their protocol provides strong security. In this paper, we have demonstrated that Li et al.’s protocol
Multimodal interfaces for dynamic interactive maps
, 1996
"... Dynamic interactive maps with transparent but power-ful human interface capabilities are beginning to emerge for a variety of geographical information systems, in-cluding ones situated on portables for travelers, stu-dents, business and service people, and others working in field settings. In the pr ..."
Abstract
-
Cited by 101 (6 self)
- Add to MetaCart
Dynamic interactive maps with transparent but power-ful human interface capabilities are beginning to emerge for a variety of geographical information systems, in-cluding ones situated on portables for travelers, stu-dents, business and service people, and others working in field settings
One Time Password Generation for Multifactor Authentication using Graphical Password
"... Abstract — Single factor authentication such as password authentication is no longer considered as secure in the Internet world. There is a rapid growth in demand for strong authentication on the highly critical web-based applications. A higher level security mechanism is needed to access the financ ..."
Abstract
- Add to MetaCart
Abstract — Single factor authentication such as password authentication is no longer considered as secure in the Internet world. There is a rapid growth in demand for strong authentication on the highly critical web-based applications. A higher level security mechanism is needed to access
Solving Authentication And Authorization Issues In Dynamic Mobile Networks
, 2003
"... SURROGATE TRUST NEGOTIATION: SOLVING AUTHENTICATION AND AUTHORIZATION ISSUES IN DYNAMIC MOBILE NETWORKS Tore L. Sundelin Department of Computer Science Master of Science This research describes a system that brings non-identity based authentication and authorization services to resource-constrained, ..."
Abstract
- Add to MetaCart
SURROGATE TRUST NEGOTIATION: SOLVING AUTHENTICATION AND AUTHORIZATION ISSUES IN DYNAMIC MOBILE NETWORKS Tore L. Sundelin Department of Computer Science Master of Science This research describes a system that brings non-identity based authentication and authorization services to resource
Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks
- In Proc. of the Eighth IFIP Conference on Communications and Multimedia Security
, 2004
"... We examine several architectures for extending the nascent technology of automated trust negotiation to bring nonidentity-based authentication and authorization to mobile devices. We examine how the location of trust agents and secure repositories a#ects such a system. We also present an implementat ..."
Abstract
-
Cited by 16 (1 self)
- Add to MetaCart
We examine several architectures for extending the nascent technology of automated trust negotiation to bring nonidentity-based authentication and authorization to mobile devices. We examine how the location of trust agents and secure repositories a#ects such a system. We also present
Authentication for paranoids: Multi-party secret handshakes
- In International Conference on Applied Cryptography and Network Security (ACNS’06
, 2006
"... Abstract. In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to traditional security tools such as authentication and key distribution protocols. A secret handshake protocol al ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
protocol of Burmester and Desmedt [4]. The resulting scheme achieves very strong privacy properties, is as efficient as the (non-private) authenticated version of the Burmester-Desmedt protocol [4, 6], but requires a supply of one-time certificates for each group member.
Results 1 - 10
of
213