A Secure and Practical Authentication Scheme Using Personal Devices
نویسندگان
چکیده
منابع مشابه
A Personal Authentication Scheme Using Mobile Technology
Security is a major concern in mobile commerce where information is send over the air. Authentication is possibly the most important property since achieving privacy and integrity may have no sense without the guaranty of the receiver identity. Cryptographic strong authentication protocols are known but the hard problem is to protect secret information, like shared or private keys, used in thes...
متن کاملPractical and Secure Message Authentication
Use of encryption algorithms in message authentication is replaced by secure hash functions which are often faster than encryption algorithms. Tsudik 14] has proposed three methods on message authentication which are only based on one-way hash functions and use some keys to make them secure. In this paper, we give a set of practical methods, each of which uses a fast collision free hash functio...
متن کاملDesign a Secure and Practical Metering Scheme
More and more metering schemes based on some special protocols or mechanisms are used to calculate the number of visits which a website receives in a certain time frame. Then, the amount of money that an advertiser pay to a website depends on this number of visits. Until now, many protocols were suggested for metering schemes in literature. However, the discussion mainly focused on the theory o...
متن کاملA Visual One-Time Password Authentication Scheme Using Mobile Devices
The use of passwords for user authentication has become ubiquitous in our everyday lives. However, password theft is becoming a common occurrence due to a variety of security problems associated with passwords. As such, many organizations are moving towards adopting alternative solutions like one-time passwords, which are only valid for a single session. Nevertheless, various one-time password ...
متن کاملA Secure YS-Like User Authentication Scheme
Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choose password freely. (2) The server does not need to maintain a password table. (3) There is no need to involve a trusted third party. Although there were several variants of the YS-like schemes claimed to address the forgery attac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2017
ISSN: 2169-3536
DOI: 10.1109/access.2017.2717862