A portable hardware security module and cryptographic key generator

MH Murtaza, H Tahir, S Tahir, ZA Alizai, Q Riaz… - Journal of Information …, 2022 - Elsevier
It has been noted with concern that the ability of a password to keep an information system
secure is diminishing. Increasingly sophisticated attack vectors and low memorability …

Cryptanalysis and improvement of ECC based authentication and key exchanging protocols

S Roy, C Khatwani - Cryptography, 2017 - mdpi.com
Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication
protocols. In this work, various recent ECC-based authentication and key exchange …

A statistical Markov-based password strength meter

BLT Thai, H Tanaka - Internet of Things, 2024 - Elsevier
Although multi-factor authentication is gaining popularity, password-based authentication
remains the most commonly employed method for both online login and data encryption. To …

Key-based cookie-less session management framework for application layer security

ZA Alizai, H Tahir, MH Murtaza, S Tahir… - Ieee …, 2019 - ieeexplore.ieee.org
The goal of this study is to extend the guarantees provided by the secure transmission
protocols such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS) and apply …

A Critical appraisal on Password based Authentication

AA Kaur, KK Mustafa - International Journal of Computer Network …, 2019 - mecs-press.org
There is no doubt that, even after the development of many other authentication schemes,
passwords remain one of the most popular means of authentication. A review in the field of …

LPG–PCFG: an improved probabilistic context-free grammar to hit low-probability passwords

X Guo, K Tan, Y Liu, M **, H Lu - Sensors, 2022 - mdpi.com
With the development of the Internet, information security has attracted more attention.
Identity authentication based on password authentication is the first line of defense; …

Security analysis of ECC based authentication protocols

C Khatwani, S Roy - 2015 International conference on …, 2015 - ieeexplore.ieee.org
In this work we consider two elliptic curve cryptography based authentication protocols for
performing cryptanalysis and security enhancement. The first one by Moosavi et al., is a …

Cryptanalysis and enhancement of an anonymous self-certified key exchange protocol

S Mandal, S Mohanty, B Majhi - Wireless Personal Communications, 2018 - Springer
Authentication protocols with anonymity have gained much popularity recently which allows
users to access any public network without compromising their identity. Several key …

A Study on Markov-based Password Strength Meters

BLT Thai, H Tanaka - IEEE Access, 2024 - ieeexplore.ieee.org
Nowadays, passwords play an important role in ensuring practical security. Password
strength meters (PSMs) are typical and well-known tools developed to help users estimate …

Denial of service attack on protocols for smart grid communications

S Roy - Research Anthology on Combating Denial-of-Service …, 2021 - igi-global.com
In this work, a denial of service (DoS) attack known as the clogging attack has been
performed on three different modern protocols for smart grid (SG) communications. The first …