2017
DOI: 10.48084/etasr.1510
|View full text |Cite
|
Sign up to set email alerts
|

Using Combined One-Time Password for Prevention of Phishing Attacks

Abstract: Αs technologies and communications develop, more sabotaging attacks occur including phishing attacks which jeopardize users' security and critical information like their passwords and credentials. Several solutions have been proposed for existing dangers. One of which is the use of one-time passwords. This issue has remained as a main challenge and requires more extensive research. In this research, we have focused on one-time password combinations and we also have proposed solutions based on behavioral patter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…However, cybercriminals are innovating new tactics and are refining their attack techniques. As a result, phishing attacks are becoming more sophisticated and evading detection even by advanced technical countermeasures [9][10][11]. The literature discusses several possible ways to identify phishing attempts based on various clues that are visible with the naked eye.…”
Section: Phishing Threat Challengesmentioning
confidence: 99%
“…However, cybercriminals are innovating new tactics and are refining their attack techniques. As a result, phishing attacks are becoming more sophisticated and evading detection even by advanced technical countermeasures [9][10][11]. The literature discusses several possible ways to identify phishing attempts based on various clues that are visible with the naked eye.…”
Section: Phishing Threat Challengesmentioning
confidence: 99%
“…Other stakeholders, including veterinarians, have the privilege to register livestock keepers in the system. Apart from livestock keepers, different stakeholders may access the system by using their username and password on the login page (Figure 8) [22,23]. The system administrator registers stakeholders by asigning the username and a temporal password that must be changed the first time the user logins into the system.…”
Section: System Securitymentioning
confidence: 99%
“…In these systems passwords are involved with the processing of images. [15][16][17] Users can enter and select from the images which makes it easier than to remember passwords [18]. Besides the user point of view, graphical passwords also provide a better security against attacks.…”
Section: Introductionmentioning
confidence: 99%