2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2022
DOI: 10.1109/seeda-cecnsm57760.2022.9932907
|View full text |Cite
|
Sign up to set email alerts
|

Security Revisited: Honeytokens meet Google Authenticator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 0 publications
0
1
0
Order By: Relevance
“…However, they still remain vulnerable to various threats that are typical of 2FA systems. In contrast, our recent two-factor honeytoken authentication solution [10] has demonstrated robustness against many common attacks. By incorporating blockchain technology, our solution is further strengthened, particularly against tampering attacks.…”
Section: Introductionmentioning
confidence: 87%
“…However, they still remain vulnerable to various threats that are typical of 2FA systems. In contrast, our recent two-factor honeytoken authentication solution [10] has demonstrated robustness against many common attacks. By incorporating blockchain technology, our solution is further strengthened, particularly against tampering attacks.…”
Section: Introductionmentioning
confidence: 87%
“…We also conducted a comparison between the most well-known authenticators to reveal how their features affect the needs of a user. Each authentication mechanism has its own authenticator, and we examined their characteristics and operational features to find out how they work and justify the selection of one [10].…”
Section: Related Workmentioning
confidence: 99%
“…An app system that improves identity-based encryption and generates safe credentials with an identity bit string component reduces identity leakage (Gupta et al, 2022). This technique is more secure than single-password or two-factor authentication since it uses many layers (Papaspirou et al, 2022). This project attempts to provide a complex authentication system that improves website security and user experience.…”
Section: Introductionmentioning
confidence: 99%