A secure network depends in part on user authentication and regrettably the authentication systems currently in use are not completely safe. However, the user is not the only party that needs to be authenticated to ensure the security of transactions on the Internet. Existing OTP mechanism cannot guarantee reuse of user's account by an adversary, re-use stolen user's device which is used in the process of authentication, and non-repudiation. This paper proposed mechanism of multi factor for secure electronic authentication. It intends to authenticate both of user and mobile device and guarantee non-repudiation, integrity of OTP from obtaining it by an adversary. The proposal can guarantee the user’s credentials by ensuring the user’s authen...
As more and more critically confidential information is managed electronically by distributed inform...
A secure user authentication process is a key prerequisite for ensuring the security of the entire e...
Background: Information and communication technology development provides services to various fields...
Protection of sensitive information is a growing concern worldwide. Failure to protect sensitive inf...
Abstract In this paper, as a proper authentication method, we made it authenticate a user who has un...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
Multi factor authentication technology based on onetime password (OTP) is utilized in many fields be...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
As more and more critically confidential information is managed electronically by distributed inform...
A secure user authentication process is a key prerequisite for ensuring the security of the entire e...
Background: Information and communication technology development provides services to various fields...
Protection of sensitive information is a growing concern worldwide. Failure to protect sensitive inf...
Abstract In this paper, as a proper authentication method, we made it authenticate a user who has un...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
Multi factor authentication technology based on onetime password (OTP) is utilized in many fields be...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
As more and more critically confidential information is managed electronically by distributed inform...
A secure user authentication process is a key prerequisite for ensuring the security of the entire e...
Background: Information and communication technology development provides services to various fields...