[go: up one dir, main page]

Akram et al., 2012 - Google Patents

A usable and secure two-factor authentication scheme

Akram et al., 2012

Document ID
15904950200111895905
Author
Akram S
Misbahuddin M
Varaprasad G
Publication year
Publication venue
Information Security Journal: A Global Perspective

External Links

Snippet

There are many secure authentication schemes that are secure but difficult to use. Most existing network applications authenticate users with a username and password pair. Such systems using the reusable passwords are susceptible to attacks based on the theft of …
Continue reading at www.tandfonline.com (other versions)

Similar Documents

Publication Publication Date Title
Jiang et al. On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services
EP3824592B1 (en) Public-private key pair protected password manager
EP2166697B1 (en) Method and system for authenticating a user by means of a mobile device
Li et al. Applying biometrics to design three‐factor remote user authentication scheme with key agreement
Archana et al. Survey on usable and secure two-factor authentication
Sood Secure dynamic identity-based authentication scheme using smart cards
Odelu et al. A secure and efficient ECC‐based user anonymity preserving single sign‐on scheme for distributed computer networks
WO2010128451A2 (en) Methods of robust multi-factor authentication and authorization and systems thereof
RU2730386C2 (en) Authentication and encryption system and method with interception protection
Shim Security flaws in three password-based remote user authentication schemes with smart cards
Iyanda et al. Development of two-factor authentication login system using dynamic password with SMS verification
Boonkrong Multi-factor authentication
Kaman et al. Remote user authentication using a voice authentication system
EP2530618B1 (en) Sign-On system with distributed access
Sharif et al. SoK: A Survey on Technological Trends for (pre) Notified eIDAS Electronic Identity Schemes
Choksi Comparative study on authentication schemes for cloud computing
Akram et al. A usable and secure two-factor authentication scheme
Ku et al. Two-factor authentication system based on extended OTP mechanism
Misbahuddin et al. A user friendly password authenticated key agreement for multi server environment
Wang et al. Matrix barcode based secure authentication without trusting third party
Xu et al. OTP bidirectional authentication scheme based on MAC address
Zaky et al. Multi-factor authentication
Reddy et al. A comparative analysis of various multifactor authentication mechanisms
Bhardwaj et al. Wearable Security-Authentication using Smartwatches
Bhujade et al. Analysis and implementation of combined approach of RSA and ECC algorithm for enhanced data security