2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2011
DOI: 10.1109/iihmsp.2011.91
|View full text |Cite
|
Sign up to set email alerts
|

An Anti-phishing User Authentication Scheme without Using a Sensitive Key Table

Abstract: Phishing is a popular technique that attackers use for the obtainment of sensitive information about users. Last year, over 44 million users became victims of phishing websites. Mutual authentication between user and server is an essential part of anti-phishing mechanisms. Lee et al. proposed a scheme that achieves mutual authentication to protect users from phishing attacks. However, a sensitive key table is necessary if users want to achieve mutual authentication on different servers. This attracts attackers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Wei-Bin Lee, et. al., [13] has proposed their work based on Anti Phishing scheme, where the mutual authentication was done between the user and the server. As we need a sensitive key table for achieving this, here, the system is developed without using the key table.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Wei-Bin Lee, et. al., [13] has proposed their work based on Anti Phishing scheme, where the mutual authentication was done between the user and the server. As we need a sensitive key table for achieving this, here, the system is developed without using the key table.…”
Section: Literature Reviewmentioning
confidence: 99%