Akram et al., 2012 - Google Patents
A usable and secure two-factor authentication schemeAkram et al., 2012
- Document ID
- 15904950200111895905
- Author
- Akram S
- Misbahuddin M
- Varaprasad G
- Publication year
- Publication venue
- Information Security Journal: A Global Perspective
External Links
Snippet
There are many secure authentication schemes that are secure but difficult to use. Most existing network applications authenticate users with a username and password pair. Such systems using the reusable passwords are susceptible to attacks based on the theft of …
- 238000000034 method 0 abstract description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jiang et al. | On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services | |
EP3824592B1 (en) | Public-private key pair protected password manager | |
EP2166697B1 (en) | Method and system for authenticating a user by means of a mobile device | |
Li et al. | Applying biometrics to design three‐factor remote user authentication scheme with key agreement | |
Archana et al. | Survey on usable and secure two-factor authentication | |
Sood | Secure dynamic identity-based authentication scheme using smart cards | |
Odelu et al. | A secure and efficient ECC‐based user anonymity preserving single sign‐on scheme for distributed computer networks | |
WO2010128451A2 (en) | Methods of robust multi-factor authentication and authorization and systems thereof | |
RU2730386C2 (en) | Authentication and encryption system and method with interception protection | |
Shim | Security flaws in three password-based remote user authentication schemes with smart cards | |
Iyanda et al. | Development of two-factor authentication login system using dynamic password with SMS verification | |
Boonkrong | Multi-factor authentication | |
Kaman et al. | Remote user authentication using a voice authentication system | |
EP2530618B1 (en) | Sign-On system with distributed access | |
Sharif et al. | SoK: A Survey on Technological Trends for (pre) Notified eIDAS Electronic Identity Schemes | |
Choksi | Comparative study on authentication schemes for cloud computing | |
Akram et al. | A usable and secure two-factor authentication scheme | |
Ku et al. | Two-factor authentication system based on extended OTP mechanism | |
Misbahuddin et al. | A user friendly password authenticated key agreement for multi server environment | |
Wang et al. | Matrix barcode based secure authentication without trusting third party | |
Xu et al. | OTP bidirectional authentication scheme based on MAC address | |
Zaky et al. | Multi-factor authentication | |
Reddy et al. | A comparative analysis of various multifactor authentication mechanisms | |
Bhardwaj et al. | Wearable Security-Authentication using Smartwatches | |
Bhujade et al. | Analysis and implementation of combined approach of RSA and ECC algorithm for enhanced data security |