OTP-based two-factor authentication using mobile phones
MH Eldefrawy, K Alghathbar… - 2011 eighth international …, 2011 - ieeexplore.ieee.org
Two-factor authentication (2FA) provides improved protection, since users are prompted to
provide something they know and something they have. This method delivers a higher-level …
provide something they know and something they have. This method delivers a higher-level …
Mobile one‐time passwords: two‐factor authentication using mobile phones
Static password authentication has security drawbacks. In two‐factor authentication (2FA,)
each user carries a device, called token, to generate passwords that are valid only one time …
each user carries a device, called token, to generate passwords that are valid only one time …
One-time password authentication with infinite nested hash claims
Abstract Systems and methods for One-Time Password (OTP) authentication with infinite
nested hash chains are described. In one aspect, a methodology includes a client device …
nested hash chains are described. In one aspect, a methodology includes a client device …
One-time password authentication with infinite hash chains
AG Chefranov - … and techniques in telecommunications, automation and …, 2008 - Springer
One-time password scheme based on infinite forward step** hash chains and not
requiring re-initialization after a certain number of authentications is proposed. It resists …
requiring re-initialization after a certain number of authentications is proposed. It resists …
One-time password system with infinite nested hash chains
Hash chains have been used as OTP generators. Lamport hashes have an intensive
computation cost and a chain length restriction. A solution for signature chains addressed …
computation cost and a chain length restriction. A solution for signature chains addressed …
Self-updating one-time password mutual authentication protocol for ad hoc network
F Xu, X Lv, Q Zhou, X Liu - KSII Transactions on Internet and …, 2014 - koreascience.kr
As a new type of wireless network, Ad hoc network does not depend on any pre-founded
infrastructure, and it has no centralized control unit. The computation and transmission …
infrastructure, and it has no centralized control unit. The computation and transmission …
An integrated One-Time-Password and access control authentication scheme
X Chengqiang, Z Zhenli - 2010 3rd International Conference on …, 2010 - ieeexplore.ieee.org
One-Time-Password authentication is a simple, little cost and more efficient technology.
Access control is another mechanism by controlling access which is legal or not. These two …
Access control is another mechanism by controlling access which is legal or not. These two …
Integrated architectural modeling and analysis for high-assurance command and control system design
Y Deng, J Wang - Annals of Software Engineering, 1999 - Springer
Abstract A Real-Time Architectural Specification (RAS) approach and its application to
command and control (C2) systems are presented. Our objective is to establish a formal …
command and control (C2) systems are presented. Our objective is to establish a formal …
Two-Factor Authentication Using Mobile OTP and Multi-dimensional Infinite Hash Chains
UK Roy, D Mahansaria - … and Communication: Proceedings of the 2020 …, 2020 - Springer
Hash chains are often used to implement One Time Password based authentication
systems. Some use finite hash chains that require frequent system re-initialization. Some …
systems. Some use finite hash chains that require frequent system re-initialization. Some …
AWGN based seed for random noise generator in ParseKey+
This research presents an enhancement in the ParseKey+ authentication scheme presented
in an earlier research. Basically, ParseKey+ relies on scattering sub-keys in a block of …
in an earlier research. Basically, ParseKey+ relies on scattering sub-keys in a block of …