User Authentication Mobile Phones Using Multi Factor Visual One-Time-Password

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 497

This Paper With 11 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICRSIE02_050

تاریخ نمایه سازی: 11 مرداد 1396

Abstract:

User authentication is a secure technique for accessing websites and can be of password-based, challenge-response and zero-knowledge types. Password-based authentication methods are categorized into fixed-password and one-time password methods. The traditional static or fixed-password methods are low-cost and simple, and are vulnerable to security attacks. In applications where security is a crucial factor, OTPs should be used. The OTP authentication methods are resistant to eavesdropping and stealing attacks, and are used in banking applications. Visual OTPs are used in this study for user authentication. The following stages are involved in the proposed method: the user visits a bank and provides the proof of purchase for his/her mobile phone and have his/her phone registered with a password. Additionally, the identification factors of the user are converted to encoded images through visual codes. The encoded image along with the static password is sent to a hash function to generate a OTP. The method uses several encryption factors to generate the OTPs and the encoded images. Use of several factors in visual codes increases their security.

Authors

Mahsa Moradmand Ziabari

Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran

A Broumandnia

Islamic Azad University, South Tehran Branch,

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Young Sil Lee, Nack Hyun Kim, Hyotaek Lim, HeungKuk Jo, ...
  • Aloul F, Zahidi S, E1-Hajj _ Two factor authentication using ...
  • Aloul F, Zahidi S, E1-Hajj _ Multi factor authentication using ...
  • Kuan-Chieh Liao, Wei-Hsun Lee, Min-Hsuan Sung, Ting-Ching Lin. A OTP ...
  • Eldefrawy M.H., Alghathbar K., Khan M.K.. OTP-based two-factor authentication using ...
  • Eldefrawy M.H., Alghathbar K., Khan M.K., Kim T.H, Elkamchouchi H.. ...
  • Hallsteinsen S, Jorstad I, Do Van Thanh. Using the mobile ...
  • A.Forouzan B. Cryptography and Network Security. New York, McGrow-Hill, 752 ...
  • Lamport L. Password authentication with insecure _ ommunication _ _ ...
  • Eko Sediyono, Kartika Imam Santoso, Suhartono. Secure login by using ...
  • Borko Furht (2011). Handbook of Augmented Reality. Springer. p. 341. ...
  • Yung-Wei Kao, Guo-Heng Luo, Hsien-Tang Lin, Yu-Kai Huang, Shyan-Ming Yuan. ...
  • Denso Wave Incorporated. Information capacity and versions of QR code. ...
  • Xing F, Zhan J. Online banking authentication using mobile phones. ...
  • Dhanashree P, Shanti K. Guru. Secured authentication using challenge-re spOnSe ...
  • نمایش کامل مراجع