2015
DOI: 10.1007/978-3-662-45402-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Transaction Authentication Using HMAC-Based One-Time Password and QR Code

Abstract: Conventional password schemes are vulnerable to shoulder surfing attack and many other attacks like brute force attack and dictionary based attack. Traditional alphabetical and numeric passwords have disadvantages from a usability standpoint, and these usability problems translate into security problems. The system combines the applications effectively in a way to transfer data securely. System provides data security with the help of ColourCombination authentication, and cryptography using QR Code Techniques. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Many banks have enhanced their security by using One-Time Password (OTP) as another authentication method in addition to the traditional username and password method [76], [77]. Then OTP is used for transaction verification at the mobile terminal [78], [79].…”
Section: B Totp Payment Authentication Algorithmmentioning
confidence: 99%
“…Many banks have enhanced their security by using One-Time Password (OTP) as another authentication method in addition to the traditional username and password method [76], [77]. Then OTP is used for transaction verification at the mobile terminal [78], [79].…”
Section: B Totp Payment Authentication Algorithmmentioning
confidence: 99%
“…In addition to the approaches described above, there are various other proposed QR code authentication schemes [18,24,28,30].…”
Section: Sms-basedmentioning
confidence: 99%
“…The only process of encoding and decoding is not enough for secure online electronic transaction because of lack of legitimacy (Plaintext validity) . Hence, the solution is to improvise a scheme of message authentication encryption …”
Section: Introductionmentioning
confidence: 99%
“…[3][4][5] Hence, the solution is to improvise a scheme of message authentication encryption. [6][7][8][9][10][11] Simple concept of authentication encryption (AE) including MAC. Let a sender () and receiver () work under the communication network of   .…”
mentioning
confidence: 99%