A portable hardware security module and cryptographic key generator
It has been noted with concern that the ability of a password to keep an information system
secure is diminishing. Increasingly sophisticated attack vectors and low memorability …
secure is diminishing. Increasingly sophisticated attack vectors and low memorability …
Cryptanalysis and improvement of ECC based authentication and key exchanging protocols
S Roy, C Khatwani - Cryptography, 2017 - mdpi.com
Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication
protocols. In this work, various recent ECC-based authentication and key exchange …
protocols. In this work, various recent ECC-based authentication and key exchange …
A statistical Markov-based password strength meter
BLT Thai, H Tanaka - Internet of Things, 2024 - Elsevier
Although multi-factor authentication is gaining popularity, password-based authentication
remains the most commonly employed method for both online login and data encryption. To …
remains the most commonly employed method for both online login and data encryption. To …
Key-based cookie-less session management framework for application layer security
The goal of this study is to extend the guarantees provided by the secure transmission
protocols such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS) and apply …
protocols such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS) and apply …
A Critical appraisal on Password based Authentication
There is no doubt that, even after the development of many other authentication schemes,
passwords remain one of the most popular means of authentication. A review in the field of …
passwords remain one of the most popular means of authentication. A review in the field of …
LPG–PCFG: an improved probabilistic context-free grammar to hit low-probability passwords
X Guo, K Tan, Y Liu, M **, H Lu - Sensors, 2022 - mdpi.com
With the development of the Internet, information security has attracted more attention.
Identity authentication based on password authentication is the first line of defense; …
Identity authentication based on password authentication is the first line of defense; …
Security analysis of ECC based authentication protocols
C Khatwani, S Roy - 2015 International conference on …, 2015 - ieeexplore.ieee.org
In this work we consider two elliptic curve cryptography based authentication protocols for
performing cryptanalysis and security enhancement. The first one by Moosavi et al., is a …
performing cryptanalysis and security enhancement. The first one by Moosavi et al., is a …
Cryptanalysis and enhancement of an anonymous self-certified key exchange protocol
Authentication protocols with anonymity have gained much popularity recently which allows
users to access any public network without compromising their identity. Several key …
users to access any public network without compromising their identity. Several key …
A Study on Markov-based Password Strength Meters
BLT Thai, H Tanaka - IEEE Access, 2024 - ieeexplore.ieee.org
Nowadays, passwords play an important role in ensuring practical security. Password
strength meters (PSMs) are typical and well-known tools developed to help users estimate …
strength meters (PSMs) are typical and well-known tools developed to help users estimate …
Denial of service attack on protocols for smart grid communications
S Roy - Research Anthology on Combating Denial-of-Service …, 2021 - igi-global.com
In this work, a denial of service (DoS) attack known as the clogging attack has been
performed on three different modern protocols for smart grid (SG) communications. The first …
performed on three different modern protocols for smart grid (SG) communications. The first …