2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) 2015
DOI: 10.1109/iciiecs.2015.7193082
|View full text |Cite
|
Sign up to set email alerts
|

A secured authentication protocol which resist password reuse attack

Abstract: Passwords are the powerful tools that tend to keep all data and information digitally safe. It is frequently noticed that text password remains predominantly popular over the other formats of passwords, due to the fact that it is simple and expedient. However, text passwords are not always sturdy enough and are very easily stolen and misused under different vulnerabilities. Other persons can obtain a text password when a person creates a weak password or a password that is completely reused in many sites. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Yildirim et al [11] provide users with persuasive information through password creation, which undoubtedly increases the user's use cost. Prajitha et al [1] proposed a user authentication protocol, which uses Android mobile phones and SMS services to resist password theft and password reuse attacks. Each time a user verifies their Web identity, they only need to fill in the username in the browser.…”
Section: Weak Passwordsmentioning
confidence: 99%
“…Yildirim et al [11] provide users with persuasive information through password creation, which undoubtedly increases the user's use cost. Prajitha et al [1] proposed a user authentication protocol, which uses Android mobile phones and SMS services to resist password theft and password reuse attacks. Each time a user verifies their Web identity, they only need to fill in the username in the browser.…”
Section: Weak Passwordsmentioning
confidence: 99%
“…Any system providing connectivity to a computer network may be at risk. Currently, security by authentication [1] [2] [3] and authorisation of production systems is considered to be insufficient since a potential attacker may steal identity data of another user or bypass authentication, violating system security [4] [5] [6]. With the development of information technology, our knowledge of computer systems advances, tooattackers can analyse weaknesses of the respective systems and use them during the attack itself.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [12] proposed a user authentication scheme that leverages a user's Android smartphone and SMS to resist password stealing and password reuse attacks, such that the user identity is verified using the mobile application by sending an encrypted one-time secret to the server using SMS such that the server can verify the user's identity.…”
Section: Related Workmentioning
confidence: 99%