2012
DOI: 10.7840/kics.2012.37c.10.949
|View full text |Cite
|
Sign up to set email alerts
|

A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device

Abstract: Our PC have been under constant threat of malicious codes and viruses today. As many new ways of cyber attacks are being developed, such as zero-day-attack, nobody's PC is guaranteed to be safe from the attacks. In case where a user uses the existing verification protocol on a unsecured PC, the user's verification information may well be threatened by sniffing or man-in-the-middle attack. Especially, deadly attacks like memory hacking would give hard time for users to even recognize any symptom of virus infect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0
1

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 3 publications
0
1
0
1
Order By: Relevance
“…한편, 피싱/파밍을 방지하기 위한 많은 기술적인 연 구들이 있어 왔다 [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18] . ② Portal site should provide bank site registration menu on a user account window.…”
unclassified
See 1 more Smart Citation
“…한편, 피싱/파밍을 방지하기 위한 많은 기술적인 연 구들이 있어 왔다 [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18] . ② Portal site should provide bank site registration menu on a user account window.…”
unclassified
“…2.4 using mobile device [10-12]] • we don't need separate mobile devices 2.5 strengthening authentication safety [13][14][15][16][17][18] • we also use the authentication strengthening method (Section 3.1.4 and 3.1.5). …”
mentioning
confidence: 99%