Online citations, reference lists, and bibliographies.
← Back to Search

An Efficient One-Time Password Authentication Scheme Using A Smart Card

Sookyoung Lee, K. Sivalingam
Published 2009 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
This paper presents a One-Time Password (OTP) mechanism to provide authentication, with particular application to thin clients in wireless networks. Many of the current OTP mechanisms have high client side computation costs, high communication costs, or limited login times. To cope with these problems, this paper proposes a new one-time password scheme using a smart card. In the scheme, we present a novel modification to the Depth-First Search (DFS) based on a unique tree structure to generate a private key. We present a detailed analysis of the proposed scheme using an OpenSSL based implementation.
This paper references



This paper is referenced by
10.15625/1813-9663/32/4/8744
PASSWORD ENCRYPTION BASED ON DYNAMIC GRAPH LABELING PRIORITY GENERATION (D.G.L.P.G.) TECHNIQUE
Sanjay Kumar Pal (2017)
10.1002/sec.331
A survey of cyber crimes
Yanping Zhang (2012)
10.1002/sec.324
A survey of security visualization for computer network logs
Y. Zhang (2012)
10.1002/sec.374
GlobalView: building global view with log files in a distributed/networked system for accountability
Y. Xiao (2014)
Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards
D. He (2013)
10.1109/ICICES.2014.7033936
Stronger authentication for password using virtual password and secret little functions
Parimi Umadevi (2014)
10.1504/IJBIS.2015.070204
Students authentication in e-assessment sessions: a theoretical biometric model for smartphone devices
R. Obeidallah (2015)
10.1504/IJSN.2013.055046
A review of GENI authentication and access control mechanisms
Z. Xiao (2013)
10.1109/JSYST.2012.2183755
Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft
Y. Xiao (2014)
10.1109/SocialCom.2010.134
Security and Privacy Risks of Using E-mail Address as an Identity
L. Jin (2010)
10.1504/IJSN.2012.053461
Internet of things' authentication and access control
Jing Liu (2012)
10.1504/IJIPSI.2011.043730
Analysing security and privacy issues of using e-mail address as identity
L. Jin (2011)
10.1504/IJSNET.2013.053722
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
Yi Wang (2013)
10.1504/IJSNET.2011.042770
Wireless telemedicine and m-health: technologies, applications and research issues
Y. Xiao (2011)
10.1109/MILCOM.2010.5679519
Notice of RetractionCreating user-relationship-graph in use of flow-net and log files for computer and network accountability and forensics
D. Takahashi (2010)
10.1007/978-3-642-29222-4_5
Studying Non-intrusive Tracing in the Internet
A. Olteanu (2010)
10.1109/ICDCSW.2012.23
Authentication and Access Control in the Internet of Things
Jing Liu (2012)
10.1002/sec.638
Cipher feedback mode under go-back-N and selective-reject protocols in error channels
Xiannuan Liang (2013)
10.1109/CCNC.2012.6181073
Notice of RetractionQ-Accountable: A overhead-based quantifiable accountability in wireless networks
Bo Fu (2012)
10.7763/IJCCE.2013.V2.193
Insider Attack-Resistant OTP (One-Time Password) Based on Bilinear Maps
Yunjin Lee (2013)
10.3390/s140814786
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Bruce Ndibanje (2014)
10.1002/sec.348
Accountability using flow-net: design, implementation, and performance evaluation
Y. Xiao (2012)
Semantic Scholar Logo Some data provided by SemanticScholar