• No results found

one-time password scheme

One Time Password Scheme Via Secret Sharing Techniques

One Time Password Scheme Via Secret Sharing Techniques

... with one- time ...Often time, the techniques used to construct this secret sharing based OTP come from research that had completely different visions in ...

50

A One-Time Server-Specific Password Authentication Scheme

A One-Time Server-Specific Password Authentication Scheme

... years, Password-based Authentication (PA) techniques have been the widely used security mecha- nism that serves as a first level defence against unau- thorised ...from password attacks. This work presents a ...

10

Prohibition of Phishing Attacks in Banking using Visual Cryptography and One-Time Password

Prohibition of Phishing Attacks in Banking using Visual Cryptography and One-Time Password

... cryptography scheme, both the shares are superimposed on one another to get back the original ...a one-time password is sent to the users mobile for additional ...

9

Securing Internet Voting Protocol using Implicit Security Model and One Time Password

Securing Internet Voting Protocol using Implicit Security Model and One Time Password

... partitioning scheme which means each vote will be further divided into m or more pieces and each piece is kept in distinct ...and password which will enable each server to store the segregated data in ...

7

Multi Tier Authentication with DIFFIE HELLMAN Key Exchange Using HMAC and AES Algorithm to Enhance Security in Cloud Computing

Multi Tier Authentication with DIFFIE HELLMAN Key Exchange Using HMAC and AES Algorithm to Enhance Security in Cloud Computing

... authentication scheme have been described which relies on username/password as well as Secure PIN and One-Time Password (OTP) for authentication, Diffie-Hellman Key Exchange for ...

9

A secure cloud storage system combining time-based one-time password and automatic blocker protocol

A secure cloud storage system combining time-based one-time password and automatic blocker protocol

... this scheme, both spot-checking and error correcting codes are used to ensure both possession and retrievabil- ity of data files on the cloud storage ...PoR scheme is de- signed using publicly verifiable ...

13

An Efficient Password Based Authentication Scheme Using Time Hash Function and Smart Card

An Efficient Password Based Authentication Scheme Using Time Hash Function and Smart Card

... authentication scheme using smart cards without password table, which circumvents most of these ...the password table, but instead maintains the onetime registration date and time of the ...

7

Bike security based on fingerprint authentication with one time password

Bike security based on fingerprint authentication with one time password

... authentication scheme can provide high secure level with acceptable implementation ...authentication scheme are used only once and then thrown ...authentication scheme may be a viable development ...

5

Evaluation of 3 Level Multifactor Authentication Model based on Click GPass Graphical Password Scheme

Evaluation of 3 Level Multifactor Authentication Model based on Click GPass Graphical Password Scheme

... authentication one after the ...textual password. For this, system performs double decryption of password stored in the database using AES-128-ECB and SHA-1 algorithm and then matches it with ...

10

Secure Graphical Password Requirements

Secure Graphical Password Requirements

... a password scheme uses as well as how the images are encoded and then retrieved when required ...of password images for verification also impacts the login process. One major complaint ...

8

4D Password Authentication Scheme

4D Password Authentication Scheme

... 3D password paradigm has been ...3D password is a multifactor authentication scheme that combines Recognisation + Recall +Tokens +Biometrics in one authentication ...3D password and an ...

5

Insider Attack-Resistant OTP (One-Time Password) Based on Bilinear Maps

Insider Attack-Resistant OTP (One-Time Password) Based on Bilinear Maps

... In this paper, we propose a new OTP scheme based on pairing operation. The scheme proposed by Choi and Kim [9] is vulnerable on masquerading by insider. In order to overcome the issue, we use a random ...

5

A Stable and Secure One Time Password Generation Mechanism using Fingerprint Features

A Stable and Secure One Time Password Generation Mechanism using Fingerprint Features

... authentication scheme is proposed for providing effective security to ATM banking ...onetime password key generation mechanism based on changed value and angle of fingerprint is proposed in ...only ...

8

Securing Internet Voting Protocol using Implicit Security Model and One Time Password

Securing Internet Voting Protocol using Implicit Security Model and One Time Password

... partitioning scheme, which means each vote will be further divided into m or more pieces and each piece is stored in different ...and password which will enable each server to keep the segregated data in ...

6

A Novel Graphical Password Authentication Scheme

A Novel Graphical Password Authentication Scheme

... a password is much more valuable to attackers than a free email account that Captcha is typically used to ...Captcha scheme. When one Captcha scheme is broken, a new and more secure one ...

7

A Novel Bank Authentication for Secure Transaction

A Novel Bank Authentication for Secure Transaction

... This study introduces a blueprint, important security tips as well as required protocols for OTP services to help banking system and individuals to shift their conventional username/password based authentication ...

8

Preventing Phishing Attacks using One Time Password and User Machine Identification

Preventing Phishing Attacks using One Time Password and User Machine Identification

... Phishing mostly uses spoofed e-mail messages that seem to come from legitimate source. Trojans, malware and other malicious software are also used for phishing attacks. Since, SMTP protocol does not validate or ...

5

Multi level authentication mechanism for grid application using one-time password

Multi level authentication mechanism for grid application using one-time password

... User authentication has an undeniable role to verify users’ access to the shared resource. Secured methods of authentication must guarantee this authentication with great security banning eavesdroppers of accessing ...

21

How to Design a Successful One-Time Signature Scheme

How to Design a Successful One-Time Signature Scheme

... The model seems contradictory at first. A skeptic might say: “No wonder we can great things in this model. Since a public function is no longer random, we are assuming something which does not exist. From a false ...

15

Creating One Time Password (OTP) infrastructures using Open Source sofware

Creating One Time Password (OTP) infrastructures using Open Source sofware

... The adoption of Open Source software can lower the TCO … and increase your security. "The economic crisis is going to be a catalyst for open source, much like the technology crash [r] ...

25

Show all 10000 documents...

Related subjects