2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) 2017
DOI: 10.1109/blackseacom.2017.8277693
|View full text |Cite
|
Sign up to set email alerts
|

Robust Two-factor smart card authentication

Abstract: Being very resilient devices, smart cards have been commonly used for two-factor authentication schemes. However, the possibility of side-channel attacks renders private data stored in the cards vulnerable to compromise. With this in mind, we propose an authentication protocol that incorporates a second factor, which is as a password, in addition to the smart card. The scheme is aimed to withstand most common security breaches as well as compromised smart card scenarios and offline dictionary attacks on the pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…A novel and strong Smart Card-based authentication were given by Candan et al [8] that uses a secured protocol, which consists Elliptic curve, Symmetric Cipher, and the Hash function aims to authenticate a user to a server via smart card. During the first (Registration) phase generates a secure random number with a unique ID, Password, and Smart card.…”
Section: Related Workmentioning
confidence: 99%
“…A novel and strong Smart Card-based authentication were given by Candan et al [8] that uses a secured protocol, which consists Elliptic curve, Symmetric Cipher, and the Hash function aims to authenticate a user to a server via smart card. During the first (Registration) phase generates a secure random number with a unique ID, Password, and Smart card.…”
Section: Related Workmentioning
confidence: 99%