Social authentication protocol for mobile phones

B Soleymani, M Maheswaran - 2009 International Conference …, 2009 - ieeexplore.ieee.org
… Finaly we can consider the combination of mobile phone and social networking for
authentication. One of the goals of the Reality Mining project is to measure users’ social networks

An identity authentication protocol in online social networks

L Li, X Zhao, G Xue - Proceedings of the 7th ACM Symposium on …, 2012 - dl.acm.org
… from their friends before authentication takes place, … new authenticated key exchange
protocol based on the exclusive secrets shared between friends. It provides identity authentication

DDoS attack resisting authentication protocol for mobile based online social network applications

M Bhattacharya, S Roy, AK Das… - Journal of Information …, 2022 - Elsevier
… Rather, we propose an overall authentication protocol framework that intends to resist or
defend a possible DDoS attack. Following any standard authentication protocol, our proposed …

A dynamic privacy preserving authentication protocol in VANET using social network

SA Shah, C Gongliang, L Jianhua, Y Glani - … Intelligence, Networking and …, 2020 - Springer
… privacy-preserving authentication protocol in VANET using the social network. We propose
… using the social network. The master vehicle helps to load balance the social network server …

Authentication with block-chain algorithm and text encryption protocol in calculation of social network

R Yu, J Wang, T Xu, J Gao, Y An, G Zhang, M Yu - IEEE Access, 2017 - ieeexplore.ieee.org
… However, as social networks have become more and more … , in user centric social networks,
we detect social communities … Social network applications reflect real world to cyberspace, …

Authentication using multi-level social networks

J Zhan, X Fang - … and Knowledge Management: First International Joint …, 2011 - Springer
… , and names of subjects are proofs for social relationships. Eligible users of social authentication
protocols should be capable to possess them. For the authentication protocols in [1, 7], …

Security Verification of Social Network Model Using Improved Three-Party Authenticated Key Exchange Protocol

VK Sinha, D Anand, S Kaur, P Singh, ID Noya - Symmetry, 2022 - mdpi.com
… proposed a novel 3PAKE protocol for the security verification of social networks, which is …
the modern social network environment against diverse assaults. This protocol was developed …

Measuring the security and reliability of authentication of social networking sites

K Sagar, V Waghmare - Procedia Computer Science, 2016 - Elsevier
… A trust model which is implemented in social networking sites is associated with an authentication
protocol. Trust evaluation models are really needed in smart environments is that they …

Authentication schemes for social network users: a review

SS Ninawe, P Venkataram - International Journal of Social …, 2019 - inderscienceonline.com
… of social networks authentication schemes is shown. Later, various attacks and their prevention
in social networks … proposed protocol with Kerberos and ElGamal authentication protocol. …

Design of authentication protocols for mobile online social networks

M Bhattacharya - 2023 - 20.198.91.3
… a brief introduction of online social networks, their characteristics, evolution, and network
structure. Next, I describe the privacy and security issues of online social networks, which have …