[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Seta et al., 2019 - Google Patents

Implement time based one time password and secure hash algorithm 1 for security of website login authentication

Seta et al., 2019

Document ID
13242765030474100787
Author
Seta H
Wati T
Kusuma I
Publication year
Publication venue
2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)

External Links

Snippet

The use of information systems is a solutions to support the operations of the institution. In order to access information systems in accordance with their access rights, usually the user will enter a username and password as the authentication process. However, this has a …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Similar Documents

Publication Publication Date Title
US9736147B1 (en) Artificial intelligence encryption model (AIEM) with device authorization and attack detection (DAAAD)
US8826018B2 (en) Stateless human detection for real-time messaging systems
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
US20180183777A1 (en) Methods and systems for user authentication
Seta et al. Implement time based one time password and secure hash algorithm 1 for security of website login authentication
JP2013509840A (en) User authentication method and system
WO2018149004A1 (en) Authentication method and system
US20130067217A1 (en) System and method for protecting access to authentication systems
Ayankoya et al. Brute-force attack prevention in cloud computing using one-time password and cryptographic hash function
Gupta et al. Implementing high grade security in cloud application using multifactor authentication and cryptography
Alattar et al. Anti-continuous collisions user-based unpredictable iterative password salted hash encryption
Balilo et al. Design of physical authentication based on OTP KeyPad
Hossain et al. An algorithm for securing user credentials by combining Encryption and Hashing method
Xu et al. OTP bidirectional authentication scheme based on MAC address
Paranjape et al. An approach towards security in private cloud using OTP
Arvin S. Lat et al. SOUL System: secure online USB login system
Raji et al. Enhancing Public Cloud Security by Developing a Model For User Authentication and Data Integrity Checking
Kansro et al. Users authentication issues and challenges in electronic commerce applications
Costa 2FA2P2: A Two Factor Authentication Scheme
Liang Two-factor human authentication
Zaidi et al. Exploring the Landscape of Password Managers for Individual Users Through Innovative Solution
Mahansaria et al. Secure Authentication Using One Time Contextual QR Code
Bölin et al. Penetration Testing of One-Time Password Authentication
Palit E-Commerce Authentication
Maqbali Strengthening Password-Based Authentication