OTP-based two-factor authentication using mobile phones

MH Eldefrawy, K Alghathbar… - 2011 eighth international …, 2011 - ieeexplore.ieee.org
Two-factor authentication (2FA) provides improved protection, since users are prompted to
provide something they know and something they have. This method delivers a higher-level …

Mobile one‐time passwords: two‐factor authentication using mobile phones

MH Eldefrawy, MK Khan, K Alghathbar… - Security and …, 2012 - Wiley Online Library
Static password authentication has security drawbacks. In two‐factor authentication (2FA,)
each user carries a device, called token, to generate passwords that are valid only one time …

One-time password authentication with infinite nested hash claims

MK Khan, MHK Eldefrawy, KS Alghathbar - US Patent 8,683,564, 2014 - Google Patents
Abstract Systems and methods for One-Time Password (OTP) authentication with infinite
nested hash chains are described. In one aspect, a methodology includes a client device …

One-time password authentication with infinite hash chains

AG Chefranov - … and techniques in telecommunications, automation and …, 2008 - Springer
One-time password scheme based on infinite forward step** hash chains and not
requiring re-initialization after a certain number of authentications is proposed. It resists …

One-time password system with infinite nested hash chains

MH Eldefrawy, MK Khan, K Alghathbar - … and DRBC 2010, Held as Part of …, 2010 - Springer
Hash chains have been used as OTP generators. Lamport hashes have an intensive
computation cost and a chain length restriction. A solution for signature chains addressed …

Self-updating one-time password mutual authentication protocol for ad hoc network

F Xu, X Lv, Q Zhou, X Liu - KSII Transactions on Internet and …, 2014 - koreascience.kr
As a new type of wireless network, Ad hoc network does not depend on any pre-founded
infrastructure, and it has no centralized control unit. The computation and transmission …

An integrated One-Time-Password and access control authentication scheme

X Chengqiang, Z Zhenli - 2010 3rd International Conference on …, 2010 - ieeexplore.ieee.org
One-Time-Password authentication is a simple, little cost and more efficient technology.
Access control is another mechanism by controlling access which is legal or not. These two …

Integrated architectural modeling and analysis for high-assurance command and control system design

Y Deng, J Wang - Annals of Software Engineering, 1999 - Springer
Abstract A Real-Time Architectural Specification (RAS) approach and its application to
command and control (C2) systems are presented. Our objective is to establish a formal …

Two-Factor Authentication Using Mobile OTP and Multi-dimensional Infinite Hash Chains

UK Roy, D Mahansaria - … and Communication: Proceedings of the 2020 …, 2020 - Springer
Hash chains are often used to implement One Time Password based authentication
systems. Some use finite hash chains that require frequent system re-initialization. Some …

AWGN based seed for random noise generator in ParseKey+

A Elçi, B Rahnama - Proceedings of the 2nd international conference on …, 2009 - dl.acm.org
This research presents an enhancement in the ParseKey+ authentication scheme presented
in an earlier research. Basically, ParseKey+ relies on scattering sub-keys in a block of …