Password-based single-sign-on authentication has been widely applied in mobile environments. It enables an identity server to issue authentication tokens to mobile users holding correct passwords. With an authentication token, one can request mobile services from related service providers without multiple registrations. However, if an adversary compromises the identity server, he can retrieve users\u27 passwords by performing dictionary guessing attacks (DGA) and can overissue authentication tokens to break the security. In this paper, we propose a password-based threshold single-sign-on authentication scheme dubbed PROTECT that thwarts adversaries who can compromise identity server(s), where multiple identity servers are introduced to auth...
In a mobile environment, a number of users act as a network nodes and communicate with one another t...
Millions of user accounts have been exposed by data breaches within the last years. The leaked crede...
[[abstract]]User authentication is one of the fundamental procedures to ensure secure communications...
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authent...
Internet authentication for popular end-user transactions, such as online banking and e-commerce, co...
Users frequently reuse their passwords when authenticating to various online services. Combined with...
We propose a threshold encryption scheme with two-party decryption, where one of the keyshares may b...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Despite their proven security breaches, text passwords have been dominating all other methods of hum...
Mobile devices are ubiquitous in today\u27s society, and the usage of these devices for secure tasks...
For most of us now, life is incomplete if living without mobile phones. This is because mobile phone...
Abstract-In this paper, we discuss how to prevent users passwords from being stolen by adversaries i...
Abstract: The internet has one of the most convenient and widely used media for people for exchangin...
The use of deception to enhance security has showed promising result as a defen sive technique. In t...
In a mobile environment, a number of users act as a network nodes and communicate with one another t...
Millions of user accounts have been exposed by data breaches within the last years. The leaked crede...
[[abstract]]User authentication is one of the fundamental procedures to ensure secure communications...
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authent...
Internet authentication for popular end-user transactions, such as online banking and e-commerce, co...
Users frequently reuse their passwords when authenticating to various online services. Combined with...
We propose a threshold encryption scheme with two-party decryption, where one of the keyshares may b...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Despite their proven security breaches, text passwords have been dominating all other methods of hum...
Mobile devices are ubiquitous in today\u27s society, and the usage of these devices for secure tasks...
For most of us now, life is incomplete if living without mobile phones. This is because mobile phone...
Abstract-In this paper, we discuss how to prevent users passwords from being stolen by adversaries i...
Abstract: The internet has one of the most convenient and widely used media for people for exchangin...
The use of deception to enhance security has showed promising result as a defen sive technique. In t...
In a mobile environment, a number of users act as a network nodes and communicate with one another t...
Millions of user accounts have been exposed by data breaches within the last years. The leaked crede...
[[abstract]]User authentication is one of the fundamental procedures to ensure secure communications...