[go: up one dir, main page]

Hebbes et al., 2011 - Google Patents

2-Factor Authentication with 2D Barcodes.

Hebbes et al., 2011

Document ID
515056404691281928
Author
Hebbes L
Chan C
Publication year
Publication venue
HAISA

External Links

Snippet

An improved user-friendly secure authentication scheme using 2D barcodes is proposed in this paper. The proposed scheme uses a known mobile device as a second factor to decode an encrypted message transferred as a 2D barcode and read via a camera on the mobile …
Continue reading at books.google.com (other versions)

Similar Documents

Publication Publication Date Title
US10027631B2 (en) Securing passwords against dictionary attacks
Choi et al. A mobile based anti-phishing authentication scheme using QR code
EP1277299B1 (en) Method for securing communications between a terminal and an additional user equipment
US8423768B2 (en) Method for controlling the location information for authentication of a mobile station
ES2373489T3 (en) PROCEDURE AND SYSTEM TO AUTHENTICATE A USER THROUGH A MOBILE DEVICE.
EP2522100B1 (en) Secure multi-uim authentication and key exchange
Das et al. On the security of SSL/TLS-enabled applications
US8132020B2 (en) System and method for user authentication with exposed and hidden keys
KR101482564B1 (en) Method and apparatus for trusted authentication and logon
Harini et al. 2CAuth: A new two factor authentication scheme using QR-code
US9635022B2 (en) Method of allowing establishment of a secure session between a device and a server
Hallsteinsen et al. Using the mobile phone as a security token for unified authentication
WO2008073555A2 (en) Secure password distribution to a client device of a network
Khan et al. Offline OTP based solution for secure internet banking access
Rao et al. Authentication using mobile phone as a security token
CN114070571A (en) Method, device, terminal and storage medium for establishing connection
Hebbes et al. 2-Factor Authentication with 2D Barcodes.
EP2940618A1 (en) Method, system, user equipment and program for authenticating a user
Lee et al. Design of a simple user authentication scheme using QR-code for mobile device
Toorani Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy
Chen et al. SSL/TLS session-aware user authentication using a gaa bootstrapped key
Yevseiev et al. Mathematical models of hybrid crypto code constructions on damaged codes
Patil et al. Secured authentication using challenge-response and quick-response code for Android mobiles
Palit E-Commerce Authentication
Tapiador Authentication