File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Book Chapter: Visual authentication based on visual cryptography using mobile devices

TitleVisual authentication based on visual cryptography using mobile devices
Authors
Issue Date2016
PublisherCRC Press.
Citation
Visual authentication based on visual cryptography using mobile devices. In Meng, W, Luo, X, Furnell, S, et al. (Eds.), Protecting Mobile Networks and Devices: Challenges and Solutions, p. 49-64. Boca Raton, FL: CRC Press, 2016 How to Cite?
Abstract© 2017 by Taylor & Francis Group, LLC. Authentication refers to the process of confirming the identity of the authenticating entity. The use of passwords for user authentication has become ubiquitous in our everyday lives. Despite its widespread usage, password-based authentication has numerous deficiencies. For instance, pass word theft is becoming a common occurrence due to a variety of security problems associated with passwords. As such, many organizations are moving toward adopting alternative solutions like one time passwords (OTPs), which are only valid for a single session. Nevertheless, various OTP schemes also suffer from a number of drawbacks in terms of their method of generation or delivery. In this chapter, we present a challenge-response visual OTP authentication scheme that is to be used in conjunction with the camera on a mobile device. The main feature of the proposed scheme is to allow the server to send a challenge over a public channel for a user to obtain a session key while safeguarding the user's long-term secret key. We present the authentication protocol, its security analysis, the various design considerations, and the advantages provided by our system
Persistent Identifierhttp://hdl.handle.net/10722/280681
ISBN

 

DC FieldValueLanguage
dc.contributor.authorChow, Yang Wai-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorBarmawi, Ari Moesriami-
dc.date.accessioned2020-02-17T14:34:40Z-
dc.date.available2020-02-17T14:34:40Z-
dc.date.issued2016-
dc.identifier.citationVisual authentication based on visual cryptography using mobile devices. In Meng, W, Luo, X, Furnell, S, et al. (Eds.), Protecting Mobile Networks and Devices: Challenges and Solutions, p. 49-64. Boca Raton, FL: CRC Press, 2016-
dc.identifier.isbn9781498735834-
dc.identifier.urihttp://hdl.handle.net/10722/280681-
dc.description.abstract© 2017 by Taylor & Francis Group, LLC. Authentication refers to the process of confirming the identity of the authenticating entity. The use of passwords for user authentication has become ubiquitous in our everyday lives. Despite its widespread usage, password-based authentication has numerous deficiencies. For instance, pass word theft is becoming a common occurrence due to a variety of security problems associated with passwords. As such, many organizations are moving toward adopting alternative solutions like one time passwords (OTPs), which are only valid for a single session. Nevertheless, various OTP schemes also suffer from a number of drawbacks in terms of their method of generation or delivery. In this chapter, we present a challenge-response visual OTP authentication scheme that is to be used in conjunction with the camera on a mobile device. The main feature of the proposed scheme is to allow the server to send a challenge over a public channel for a user to obtain a session key while safeguarding the user's long-term secret key. We present the authentication protocol, its security analysis, the various design considerations, and the advantages provided by our system-
dc.languageeng-
dc.publisherCRC Press.-
dc.relation.ispartofProtecting Mobile Networks and Devices: Challenges and Solutions-
dc.titleVisual authentication based on visual cryptography using mobile devices-
dc.typeBook_Chapter-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-85052615270-
dc.identifier.spage49-
dc.identifier.epage64-
dc.publisher.placeBoca Raton, FL-
dc.identifier.partofdoi10.1201/9781315369648-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats