File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1201/9781315369648
- Scopus: eid_2-s2.0-85052615270
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Book Chapter: Visual authentication based on visual cryptography using mobile devices
Title | Visual authentication based on visual cryptography using mobile devices |
---|---|
Authors | |
Issue Date | 2016 |
Publisher | CRC Press. |
Citation | Visual authentication based on visual cryptography using mobile devices. In Meng, W, Luo, X, Furnell, S, et al. (Eds.), Protecting Mobile Networks and Devices: Challenges and Solutions, p. 49-64. Boca Raton, FL: CRC Press, 2016 How to Cite? |
Abstract | © 2017 by Taylor & Francis Group, LLC. Authentication refers to the process of confirming the identity of the authenticating entity. The use of passwords for user authentication has become ubiquitous in our everyday lives. Despite its widespread usage, password-based authentication has numerous deficiencies. For instance, pass word theft is becoming a common occurrence due to a variety of security problems associated with passwords. As such, many organizations are moving toward adopting alternative solutions like one time passwords (OTPs), which are only valid for a single session. Nevertheless, various OTP schemes also suffer from a number of drawbacks in terms of their method of generation or delivery. In this chapter, we present a challenge-response visual OTP authentication scheme that is to be used in conjunction with the camera on a mobile device. The main feature of the proposed scheme is to allow the server to send a challenge over a public channel for a user to obtain a session key while safeguarding the user's long-term secret key. We present the authentication protocol, its security analysis, the various design considerations, and the advantages provided by our system |
Persistent Identifier | http://hdl.handle.net/10722/280681 |
ISBN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chow, Yang Wai | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Barmawi, Ari Moesriami | - |
dc.date.accessioned | 2020-02-17T14:34:40Z | - |
dc.date.available | 2020-02-17T14:34:40Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Visual authentication based on visual cryptography using mobile devices. In Meng, W, Luo, X, Furnell, S, et al. (Eds.), Protecting Mobile Networks and Devices: Challenges and Solutions, p. 49-64. Boca Raton, FL: CRC Press, 2016 | - |
dc.identifier.isbn | 9781498735834 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280681 | - |
dc.description.abstract | © 2017 by Taylor & Francis Group, LLC. Authentication refers to the process of confirming the identity of the authenticating entity. The use of passwords for user authentication has become ubiquitous in our everyday lives. Despite its widespread usage, password-based authentication has numerous deficiencies. For instance, pass word theft is becoming a common occurrence due to a variety of security problems associated with passwords. As such, many organizations are moving toward adopting alternative solutions like one time passwords (OTPs), which are only valid for a single session. Nevertheless, various OTP schemes also suffer from a number of drawbacks in terms of their method of generation or delivery. In this chapter, we present a challenge-response visual OTP authentication scheme that is to be used in conjunction with the camera on a mobile device. The main feature of the proposed scheme is to allow the server to send a challenge over a public channel for a user to obtain a session key while safeguarding the user's long-term secret key. We present the authentication protocol, its security analysis, the various design considerations, and the advantages provided by our system | - |
dc.language | eng | - |
dc.publisher | CRC Press. | - |
dc.relation.ispartof | Protecting Mobile Networks and Devices: Challenges and Solutions | - |
dc.title | Visual authentication based on visual cryptography using mobile devices | - |
dc.type | Book_Chapter | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-85052615270 | - |
dc.identifier.spage | 49 | - |
dc.identifier.epage | 64 | - |
dc.publisher.place | Boca Raton, FL | - |
dc.identifier.partofdoi | 10.1201/9781315369648 | - |