Two-factor authentication scheme for mobile money: A review of threat models and countermeasures

G Ali, M Ally Dida, A Elikana Sam - Future Internet, 2020 - mdpi.com
The proliferation of digital financial innovations like mobile money has led to the rise in
mobile subscriptions and transactions. It has also increased the security challenges …

A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System

B Baruah, S Dhal - Computers & Security, 2018 - Elsevier
Smart Home is an emerging key-element of the advantages of Internet of Things (IoT), which
facilitates an individual to have control over the smart devices of his house through the …

Implementation of enhanced secure hash algorithm towards a secured web portal

FE De Guzman, BD Gerardo… - 2019 IEEE 4th …, 2019 - ieeexplore.ieee.org
In this paper, the application of the enhanced secure hash algorithm-512 is implemented on
web applications specifically in password hashing. In addition to the enhancement of hash …

Time-based one-time password for Wi-Fi authentication and security

C Sudar, SK Arjun, LR Deepthi - 2017 international conference …, 2017 - ieeexplore.ieee.org
In the age of IOT, as more and more devices are getting connected to the internet through
wireless networks, a better security infrastructure is required to protect these devices from …

Providing security to land record with the computation of iris, blockchain, and one time password

TN Shankar, P Rakesh, TB Rao… - 2021 International …, 2021 - ieeexplore.ieee.org
Out of many problems regarding land recording, so many fraudulent methods can be
applied to obtain the records from the virtual storage system. The factors related to it might …

Secure three-tier authentication approach for agricultural internet of things

R Lama, S Karmakar - Cyber-Physical Systems, 2024 - Taylor & Francis
ABSTRACT The Agricultural Internet of Things (AIOT) transforms food production by
integrating IoT and IFTTT services in farming. Devices gather data on temperature, humidity …

The security method in mqtt protocol for internet of things

CF Hsieh, CK Chang - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
One of the most extensive protocols on the Internet of Things is Message Queuing Telemetry
Transport (MQTT). However, there is no complete security method for the security of this …

Preventing SSRF (Server-Side Request Forgery) and CSRF (Cross-Site Request Forgery) Using Extended Visual Cryptography and QR Code

N Arora, P Singh, S Sahu, VK Keshari… - Proceedings of Second …, 2021 - Springer
In this era of technology where technology advancement is at its peak, and new innovations
are being introduced every day, Security of consumer plays an important role and can't be …

Generation of One-Time Password for the Authentication of Software Requirements Using Secure Hash Algorithms

J Ahmad, CW Mohammad, M Sadiq - Proceedings of International …, 2022 - Springer
Security requirement is a non-functional requirement whose objective is to safeguard the
data from misusers. Different algorithms have been developed to provide security in …

[HTML][HTML] 可執行於未授權物聯網裝置之認證機制

DY Li - 2017 - ir.lib.ncu.edu.tw
摘要(中) 在物聯網越來越普及的這個時代, 我們所面臨的資安問題不再侷限在個人電腦上,
家中的電視冰箱等都有可能成為駭客攻擊的對象. 當企業將自家產品傳感器佈署在管轄不到的 …