[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sasirekha, 2013 - Google Patents

Users Cell Phone and Short Message Service to Prevent Password Stealing and Password Reuse Attacks

Sasirekha, 2013

View PDF
Document ID
9728979355380476940
Author
Sasirekha K
Publication year
Publication venue
International Conference on Engineering and Technology

External Links

Snippet

Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users' passwords are prone to be stolen and compromised under different threats and vulnerabilities. Firstly, users often select weak …
Continue reading at conference.bonfring.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security

Similar Documents

Publication Publication Date Title
Sun et al. oPass: A user authentication protocol resistant to password stealing and password reuse attacks
US8132020B2 (en) System and method for user authentication with exposed and hidden keys
US20170318008A1 (en) Artificial intelligence encryption model (aiem) with device authorization and attack detection (daaad)
CN101420302A (en) Safe identification method and device
Zmezm et al. A Novel Scan2Pass Architecture for Enhancing Security towards E-Commerce
Kassim et al. Procurepass: A user authentication protocol to resist password stealing and password reuse attack
Raddum et al. Security analysis of mobile phones used as OTP generators
Karthiga et al. Enhancing performance of user authentication protocol with resist to password reuse attacks
Mahnamfar et al. ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems
Eldow et al. Literature review of authentication layer for public cloud computing: a meta-analysis
Kumari et al. Hacking resistance protocol for securing passwords using personal device
Dietz et al. Hardening Persona-Improving Federated Web Login.
Yasin et al. Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT).
Sasirekha Users Cell Phone and Short Message Service to Prevent Password Stealing and Password Reuse Attacks
Maddipati Implementation of Captcha as Graphical Passwords For Multi Security
Subhashini et al. Protecting password piracy using authentication protocol
Bhuvaneshwari et al. Secured Password Management Technique Using One-Time Password Protocol In Smartphone
Liou Performance measures for evaluating the dynamic authentication techniques
Rifa-Pous A secure mobile-based authentication system for e-banking
Xu et al. Qrtoken: Unifying authentication framework to protect user online identity
Leicher et al. Trusted computing enhanced user authentication with OpenID and trustworthy user interface
Hsu et al. WebCallerID: Leveraging cellular networks for Web authentication
Devi et al. OPass: Attractive presentation of user authentication protocol with resist to password reuse attacks
Gupta et al. Securing Web Access: PUF-Driven
Gupta et al. Securing Web Access: PUF-Driven Two-Factor Authentication for Enhanced Protection