Cryptographic methods and apparatus for secure authentication

A Juels, BS Kaliski Jr - US Patent 7,725,730, 2010 - Google Patents
H04L 29/06(2006.01)(57) ABSTRACT H04L 9/32(2006.01) G06F2L/00(2006.01) Secure
authentication protocols, particularly well-suited for G06F 7/04(2006.01) use in …

OTP-based two-factor authentication using mobile phones

MH Eldefrawy, K Alghathbar… - 2011 eighth international …, 2011 - ieeexplore.ieee.org
Two-factor authentication (2FA) provides improved protection, since users are prompted to
provide something they know and something they have. This method delivers a higher-level …

A new approach to constructing decentralized identifier for secure and flexible key rotation

CS Park, HM Nam - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Owing to the introduction of blockchain (BC) technology, a decentralized identity (DID)
model has been proposed to replace conventional identity models based on centralized …

One-time password based on hash chain without shared secret and re-registration

CS Park - Computers & Security, 2018 - Elsevier
Lamport's one-time password (OTP) was originally proposed to address the weaknesses of
a simple password system. However, it has been widely used to design key management …

Mobile one‐time passwords: two‐factor authentication using mobile phones

MH Eldefrawy, MK Khan, K Alghathbar… - Security and …, 2012 - Wiley Online Library
Static password authentication has security drawbacks. In two‐factor authentication (2FA,)
each user carries a device, called token, to generate passwords that are valid only one time …

Implement time based one time password and secure hash algorithm 1 for security of website login authentication

H Seta, T Wati, IC Kusuma - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
The use of information systems is a solutions to support the operations of the institution. In
order to access information systems in accordance with their access rights, usually the user …

Scrutinising internet banking security solutions

BUI Khan, RF Olanrewaju, F Anwar… - … of Information and …, 2020 - inderscienceonline.com
Internet-banking is a crucial service offered by financial Institutions and has gained
popularity at a high pace. Owing to the increasing usage of this service, it is being frequently …

One-time password authentication with infinite nested hash claims

MK Khan, MHK Eldefrawy, KS Alghathbar - US Patent 8,683,564, 2014 - Google Patents
Abstract Systems and methods for One-Time Password (OTP) authentication with infinite
nested hash chains are described. In one aspect, a methodology includes a client device …

Authentication protocols based on one-time passwords

S Babkin, A Epishkina - 2019 IEEE Conference of Russian …, 2019 - ieeexplore.ieee.org
Nowadays one-time passwords are used in a lot of areas of information technologies
including e-commerce. A few vulnerabilities in authentication protocols based on one-time …

Achieve space-efficient key management in lightning network

G Wei, X Mao, R Lu, J Shao, Y Guan, G Lu - Computer Networks, 2021 - Elsevier
The low transaction throughput, high transaction latency, and unfriendly micropayment are
the main obstacles hindering Bitcoin use in time-sensitive environments. To mitigate these …