• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Multi-channel, multilevel authentication for more secure ebanking,” In (2010)

by M A Fairuz, K Renaud
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

Secure Authentication Protocol Based on Machine-metrics and RC4-EA Hashing

by Ashraf Aboshosha , Kamal A Eldahshan , Eman K Elsayed , Ahmed A Elngar
"... Abstract Most authentication schemes are using physical token such as smart cards to restrict services. Although these schemes have been widely deployed for various kinds of daily applications; there are severe challenges regarding their infrastructure requirements and security. This paper proposes ..."
Abstract - Add to MetaCart
Abstract Most authentication schemes are using physical token such as smart cards to restrict services. Although these schemes have been widely deployed for various kinds of daily applications; there are severe challenges regarding their infrastructure requirements and security. This paper proposes an efficient authentication protocol based on user's machine-metrics. The proposed protocol uses the machine physical metrics to identify machines in the network, which provides the basic capability to prevent an unauthorized machine to access resources. Thus, machine-merics based authentication for machine can be looked as an analog of biometric-based authentication for human. The proposed protocol is employing the RC4-EA Hashing function to secure the collected machinemerics. Since it is satisfying the basic requirements of a cryptographic hash function. Therefore, the purpose of the proposed protocol is theft-proofing and guarding against attacks based on stolen or lost tokens. Also, it offers strong protection against several attacks such as credential compromising attacks.

R]

by Jesus Diaz, David Arroyo, Francisco B. Rodriguez , 2013
"... iv ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...a high capacity but unsecure channel, has been successful or not. If the outcome of such verification is positive, given their protocol, the communication will be origin authenticated. The authors in =-=[19, 30]-=- make a similar use of this multichannel combination in order to achieve entity authentication. Namely, they make use of mobile phones, which are used to receive and/or send a One Time Pin which will ...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University