Implement time based one time password and secure hash algorithm 1 for security of website login authentication

H Seta, T Wati, IC Kusuma - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
The use of information systems is a solutions to support the operations of the institution. In
order to access information systems in accordance with their access rights, usually the user …

Authentication protocols based on one-time passwords

S Babkin, A Epishkina - 2019 IEEE Conference of Russian …, 2019 - ieeexplore.ieee.org
Nowadays one-time passwords are used in a lot of areas of information technologies
including e-commerce. A few vulnerabilities in authentication protocols based on one-time …

Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach

A Bexheti, M Langheinrich, I Elhart… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
A plethora of sensors embedded in wearable, mobile, and infrastructure devices allow us to
seamlessly capture large parts of our daily activities and experiences. It is not hard to …

Secure Authentication Using One Time Contextual QR Code

D Mahansaria, UK Roy - … Symposium on Security in Computing and …, 2019 - Springer
Traditional methods of authentication are subject to a wide variety of attacks. There is a high
demand to deploy necessary mechanisms while authenticating a user to safeguard him/her …

A privacy-aware and secure system for human memory augmentation

A Bexheti - 2019 - sonar.ch
The ubiquity of digital sensors embedded in today's mobile and wearable devices (eg,
smartphones, wearable cameras, wristbands) has made technology more intertwined with …

[PDF][PDF] Multi-Factor Authentication using Mobile Phones

M Jadhav, S Dudhal, S Mate, A Raut - ijresm.com
Online and Enterprise resources typically required authentication before user allow to
access the sensitive applications and information. Sensitive information contains user …