Sasirekha, 2013 - Google Patents
Users Cell Phone and Short Message Service to Prevent Password Stealing and Password Reuse AttacksSasirekha, 2013
View PDF- Document ID
- 9728979355380476940
- Author
- Sasirekha K
- Publication year
- Publication venue
- International Conference on Engineering and Technology
External Links
Snippet
Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users' passwords are prone to be stolen and compromised under different threats and vulnerabilities. Firstly, users often select weak …
- 238000011084 recovery 0 abstract description 32
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun et al. | oPass: A user authentication protocol resistant to password stealing and password reuse attacks | |
US8132020B2 (en) | System and method for user authentication with exposed and hidden keys | |
US20170318008A1 (en) | Artificial intelligence encryption model (aiem) with device authorization and attack detection (daaad) | |
CN101420302A (en) | Safe identification method and device | |
Zmezm et al. | A Novel Scan2Pass Architecture for Enhancing Security towards E-Commerce | |
Kassim et al. | Procurepass: A user authentication protocol to resist password stealing and password reuse attack | |
Raddum et al. | Security analysis of mobile phones used as OTP generators | |
Karthiga et al. | Enhancing performance of user authentication protocol with resist to password reuse attacks | |
Mahnamfar et al. | ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems | |
Eldow et al. | Literature review of authentication layer for public cloud computing: a meta-analysis | |
Kumari et al. | Hacking resistance protocol for securing passwords using personal device | |
Dietz et al. | Hardening Persona-Improving Federated Web Login. | |
Yasin et al. | Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT). | |
Sasirekha | Users Cell Phone and Short Message Service to Prevent Password Stealing and Password Reuse Attacks | |
Maddipati | Implementation of Captcha as Graphical Passwords For Multi Security | |
Subhashini et al. | Protecting password piracy using authentication protocol | |
Bhuvaneshwari et al. | Secured Password Management Technique Using One-Time Password Protocol In Smartphone | |
Liou | Performance measures for evaluating the dynamic authentication techniques | |
Rifa-Pous | A secure mobile-based authentication system for e-banking | |
Xu et al. | Qrtoken: Unifying authentication framework to protect user online identity | |
Leicher et al. | Trusted computing enhanced user authentication with OpenID and trustworthy user interface | |
Hsu et al. | WebCallerID: Leveraging cellular networks for Web authentication | |
Devi et al. | OPass: Attractive presentation of user authentication protocol with resist to password reuse attacks | |
Gupta et al. | Securing Web Access: PUF-Driven | |
Gupta et al. | Securing Web Access: PUF-Driven Two-Factor Authentication for Enhanced Protection |