2017
DOI: 10.1109/access.2017.2717862
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Practical Authentication Scheme Using Personal Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 25 publications
0
19
0
Order By: Relevance
“…Rivest cypher (RC5) chaotic key scheduling algorithm is performed for health monitoring systems to protect against several attacks and to secure the patient's clinical reports. The chaotic image encryption algorithm and Bitwise operation are performed for wireless image transmission to reduce the complexity and for analyzing the security performance [7] [8].…”
Section: Nowadaysmentioning
confidence: 99%
See 1 more Smart Citation
“…Rivest cypher (RC5) chaotic key scheduling algorithm is performed for health monitoring systems to protect against several attacks and to secure the patient's clinical reports. The chaotic image encryption algorithm and Bitwise operation are performed for wireless image transmission to reduce the complexity and for analyzing the security performance [7] [8].…”
Section: Nowadaysmentioning
confidence: 99%
“…A. Vyasa Bharadwaja, V. Ganesan DNA encoding role performs matrix operations on scrambled DNA design based on CML and DNA sequences to encrypt a final output image to improve the security and statistical analysis performance [7]. User authentication technique on wearable devices is implemented using three combinations of biometrics such as physiological, hybrid and behavioral by SVM classifiers to improve the accuracy of the authentication by comparison of three biometrics [9].…”
Section: Dna Computing Based Encryption Algorithm For Wireless Multimmentioning
confidence: 99%
“…• Traffic analysis and scanning (eavesdropping): Monitors and analyses data as they travel over the Internet or wireless network, for example, monitoring data size, number of connections, open ports, visitor identity and vulnerabilities in operating systems [94]. • Keylogger and snooping: Records authentication activities in victim devices during keystrokes monitoring of username/password [95]. • Tracking: Records and traces users' information such as location for network devices and personal information such as name, address, email, and age [96].…”
Section: Passive Attacksmentioning
confidence: 99%
“…Verification is used to check whether the recipient holding the payment instrument at the ATM is the legitimate owner of the instrument. For authentication in QuickCash Online, we utilize the ATM location, the transaction validity period, and the virtual account number in addition to the OTP which is used in many authentication schemes [ 33 , 34 , 35 , 36 ]. The recipient’s mobile phone is bound to the transaction, and it plays a crucial role in the verification process.These factors provide an adequate authentication level for QuickCash Online.…”
Section: Security Analysismentioning
confidence: 99%