QR-Code Based Mutual Authentication System for Web Service
نویسندگان
چکیده
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملPaper-based Document Authentication using Digital Signature and QR Code
Department of Computer Science, Graduate School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi, Bangkok 10240 Thailand Abstract. There are still needs for paper-based documents in certain circumstances where electronic documents cannot efficiently replace them. For example, documents issued by the government such as birth certificates, driver li...
متن کاملA Novel User Authentication Scheme Based on QR-Code
User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel. Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access....
متن کاملA Design of Security Framework for e-Health Authentication System using QR Code
E-Health is nowadays a commonly used system, widely known as electronic health, where there exist many types of services; providing electronic health records, prescriptions, consumer health information, healthcare information systems, etc. In this modern period of time, a considerable number of patients have taken e-health into consideration, due to the convenience of services provided. The pop...
متن کامل2CAuth: A New Two Factor Authentication Scheme Using QR-Code
Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading off usability. In this paper we present ‘2CA...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Korea Information and Communications Society
سال: 2014
ISSN: 1226-4717
DOI: 10.7840/kics.2014.39b.4.207