Seta et al., 2019 - Google Patents
Implement time based one time password and secure hash algorithm 1 for security of website login authenticationSeta et al., 2019
- Document ID
- 13242765030474100787
- Author
- Seta H
- Wati T
- Kusuma I
- Publication year
- Publication venue
- 2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)
External Links
Snippet
The use of information systems is a solutions to support the operations of the institution. In order to access information systems in accordance with their access rights, usually the user will enter a username and password as the authentication process. However, this has a …
- 238000000034 method 0 abstract description 32
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9736147B1 (en) | Artificial intelligence encryption model (AIEM) with device authorization and attack detection (DAAAD) | |
US8826018B2 (en) | Stateless human detection for real-time messaging systems | |
CN110401615B (en) | Identity authentication method, device, equipment, system and readable storage medium | |
US20180183777A1 (en) | Methods and systems for user authentication | |
Seta et al. | Implement time based one time password and secure hash algorithm 1 for security of website login authentication | |
JP2013509840A (en) | User authentication method and system | |
WO2018149004A1 (en) | Authentication method and system | |
US20130067217A1 (en) | System and method for protecting access to authentication systems | |
Ayankoya et al. | Brute-force attack prevention in cloud computing using one-time password and cryptographic hash function | |
Gupta et al. | Implementing high grade security in cloud application using multifactor authentication and cryptography | |
Alattar et al. | Anti-continuous collisions user-based unpredictable iterative password salted hash encryption | |
Balilo et al. | Design of physical authentication based on OTP KeyPad | |
Hossain et al. | An algorithm for securing user credentials by combining Encryption and Hashing method | |
Xu et al. | OTP bidirectional authentication scheme based on MAC address | |
Paranjape et al. | An approach towards security in private cloud using OTP | |
Arvin S. Lat et al. | SOUL System: secure online USB login system | |
Raji et al. | Enhancing Public Cloud Security by Developing a Model For User Authentication and Data Integrity Checking | |
Kansro et al. | Users authentication issues and challenges in electronic commerce applications | |
Costa | 2FA2P2: A Two Factor Authentication Scheme | |
Liang | Two-factor human authentication | |
Zaidi et al. | Exploring the Landscape of Password Managers for Individual Users Through Innovative Solution | |
Mahansaria et al. | Secure Authentication Using One Time Contextual QR Code | |
Bölin et al. | Penetration Testing of One-Time Password Authentication | |
Palit | E-Commerce Authentication | |
Maqbali | Strengthening Password-Based Authentication |