A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System
Smart Home is an emerging key-element of the advantages of Internet of Things (IoT), which
facilitates an individual to have control over the smart devices of his house through the …
facilitates an individual to have control over the smart devices of his house through the …
Analysis of vulnerabilities that can occur when generating one-time password
H Kim, J Han, C Park, O Yi - Applied Sciences, 2020 - mdpi.com
Featured Application Cryptography; Random Number analysis. Abstract A one-time
password (OTP) is a password that is valid for only one login session or transaction, in IT …
password (OTP) is a password that is valid for only one login session or transaction, in IT …
Pick location security: Seamless integrated multi-factor authentication
KI Ramatsakane, WS Leung - 2017 IST-Africa Week …, 2017 - ieeexplore.ieee.org
Authentication is one of the key aspects of securing applications and systems alike. While in
most existing systems this is achieved using usernames and passwords it has been …
most existing systems this is achieved using usernames and passwords it has been …
Analysis of Distinguishable Security between the One-Time Password Extraction Function Family and Random Function Family
H Kim, O Yi - Applied Sciences, 2023 - mdpi.com
Featured Application Cryptography; Random Number analysis. Abstract A one-time
password is a security system that uses a password that is only used once for authentication …
password is a security system that uses a password that is only used once for authentication …
Secure three-tier authentication approach for agricultural internet of things
R Lama, S Karmakar - Cyber-Physical Systems, 2024 - Taylor & Francis
ABSTRACT The Agricultural Internet of Things (AIOT) transforms food production by
integrating IoT and IFTTT services in farming. Devices gather data on temperature, humidity …
integrating IoT and IFTTT services in farming. Devices gather data on temperature, humidity …
M2U2: Multifactor Mobile Based Unique User Authentication Mechanism
R Bhalla, N Jeyanthi - Intelligent Systems Design and Applications: 18th …, 2020 - Springer
Identifying and validating the user is a major concern in a heterogeneous network domain.
Conventional algorithms and mechanisms could authenticate the users/messages, but with …
Conventional algorithms and mechanisms could authenticate the users/messages, but with …
A Composite Vulnerability Assessment Tool for Authentication Factor Multiplicity Technologies
A English - 2020 - search.proquest.com
This study explored the relationship between authentication factor multiplicity and composite
vulnerability exposures, providing a novel instrument to compute composite vulnerability …
vulnerability exposures, providing a novel instrument to compute composite vulnerability …
[PDF][PDF] NOVEL APPROACH FOR END USER SECURITY ACCESS IN CYBER PHYSICAL SYSTEM USING MULTILAYER AUTHENTICATION
M Maranco, V Manikandan - ijcse.com
The exponential growth of cyber-physical systems (CPS), new security challenges have
emerged. In this manuscript, we propose and systematize existing research on CPS security …
emerged. In this manuscript, we propose and systematize existing research on CPS security …
[PDF][PDF] An approach to implement secure user authentication scheme using secret values extracted from private information and unique biometric images of user …
R Das, A Chakraborty, S Nandi, S Dutta - Int. J. Appl. Eng. Res, 2017 - academia.edu
Proposed system introduces a numeric OTP (one time password) based authentication
system where a secured value extracted from user private information (user id, password …
system where a secured value extracted from user private information (user id, password …