Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards
In 2004, Das et al. proposed a dynamic identity-based remote user authentication scheme using smart cards. This scheme allows users to choose and change their passwords freely, and the server does not maintain any verification table. Das et al. claimed ...
MBNS Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure
Multiple Base Notational System (MBNS) steganography (Zhang & Wang, 2005) scheme employs human vision sensitivity to hide a large amount of secret bits into a still image with a high imperceptibility and is demonstrated to be robust to statistical ...
Tokenization and Other Methods of Security for Cardholder Data
This paper compares the relative security strengths and practical use of tokenization with other cardholder data protection methods including truncation, masking, encryption, hash, and keyed hash. The usefulness of each method is described, and the ...
Cookie-Based Virtual Password Authentication Protocol
The password is the most common technique used to authenticate Web users. Password-based authentication protocols are susceptible to automated dictionary attacks because most passwords are chosen by users from their personal domain. In this paper, we ...
Web Authentication Protocol Using Zero Knowledge Proof
Market research surveys report that 75% of hacks occur at the application layer. Of the multiple vulnerabilities that exist in Web application software, proper authentication of the client and the server to each other is fundamental to the security of ...