[go: up one dir, main page]

Hebbes et al., 2011 - Google Patents

2-Factor Authentication with 2D Barcodes.

Hebbes et al., 2011

Document ID
515056404691281928
Author
Hebbes L
Chan C
Publication year
Publication venue
HAISA

External Links

Snippet

An improved user-friendly secure authentication scheme using 2D barcodes is proposed in this paper. The proposed scheme uses a known mobile device as a second factor to decode an encrypted message transferred as a 2D barcode and read via a camera on the mobile …
Continue reading at books.google.com (other versions)

Similar Documents

Publication Publication Date Title
US9015489B2 (en) Securing passwords against dictionary attacks
EP1277299B1 (en) Method for securing communications between a terminal and an additional user equipment
US8423768B2 (en) Method for controlling the location information for authentication of a mobile station
ES2373489T3 (en) PROCEDURE AND SYSTEM TO AUTHENTICATE A USER THROUGH A MOBILE DEVICE.
EP2522100B1 (en) Secure multi-uim authentication and key exchange
US8132020B2 (en) System and method for user authentication with exposed and hidden keys
KR101482564B1 (en) Method and apparatus for trusted authentication and logon
Harini et al. 2CAuth: A new two factor authentication scheme using QR-code
US9635022B2 (en) Method of allowing establishment of a secure session between a device and a server
Choi et al. A mobile based anti-phishing authentication scheme using QR code
EP2092674A2 (en) Secure password distribution to a client device of a network
Hallsteinsen et al. Using the mobile phone as a security token for unified authentication
Khan et al. Offline OTP based solution for secure internet banking access
CN114070571A (en) Method, device, terminal and storage medium for establishing connection
Hebbes et al. 2-Factor Authentication with 2D Barcodes.
Rao et al. Authentication using mobile phone as a security token
EP2940618A1 (en) Method, system, user equipment and program for authenticating a user
Srivastava et al. A review on remote user authentication schemes using smart cards
Toorani Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy
Yevseiev et al. Mathematical models of hybrid crypto-code constructions on damaged codes
Lee et al. Design of a simple user authentication scheme using QR-code for mobile device
Patil et al. Secured authentication using challenge-response and quick-response code for Android mobiles
Palit E-Commerce Authentication
Tapiador Authentication
Chen et al. SSL/TLS session-aware user authentication using a gaa bootstrapped key