2018 14th International Conference on Electronics Computer and Computation (ICECCO) 2018
DOI: 10.1109/icecco.2018.8634675
|View full text |Cite
|
Sign up to set email alerts
|

User Define Time Based Change Pattern Dynamic Password Authentication Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…The most common form of authentication is the use of username and password. Static and dynamic passwords are used to protect a system from an unauthorized individual; the latter uses a third-party system to generate passwords while the former is prone to keylogging and other forms of attacks [1]. A shared secret seed has proven to enhance TOTP security on web protocol, specifically in OTP authentication [2].…”
Section: Introductionmentioning
confidence: 99%
“…The most common form of authentication is the use of username and password. Static and dynamic passwords are used to protect a system from an unauthorized individual; the latter uses a third-party system to generate passwords while the former is prone to keylogging and other forms of attacks [1]. A shared secret seed has proven to enhance TOTP security on web protocol, specifically in OTP authentication [2].…”
Section: Introductionmentioning
confidence: 99%