2014
DOI: 10.1007/978-3-319-14054-4_12
|View full text |Cite
|
Sign up to set email alerts
|

A Modular Framework for Multi-Factor Authentication and Key Exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 29 publications
0
22
0
Order By: Relevance
“…We require tag-based password authentication protocol (tPAuth) and tag-based password-authenticated keyexchange protocol (tPAKE), which will provide secure mutual authentication (resistant to offline dictionary attacks) based on knowledge of a shared secret password, and with acceptance only if both parties use the same, possibly public, auxiliary tag [21,28].…”
Section: Tag-based Password Authentication and Key Exchangementioning
confidence: 99%
See 2 more Smart Citations
“…We require tag-based password authentication protocol (tPAuth) and tag-based password-authenticated keyexchange protocol (tPAKE), which will provide secure mutual authentication (resistant to offline dictionary attacks) based on knowledge of a shared secret password, and with acceptance only if both parties use the same, possibly public, auxiliary tag [21,28].…”
Section: Tag-based Password Authentication and Key Exchangementioning
confidence: 99%
“…In our reference implementation we use tSOKE a tagged version of the Simple Open Key Exchange (SOKE) protocol [1] that is described in Sect. 7; note that any tPAuth or tPAKE protocol could be used in our generic constructions, and any PAKE protocol can in fact be transformed into a tPAuth or tPAKE protocol by hashing the original password with the tag and using the result as a new password [21].…”
Section: Tag-based Password Authentication and Key Exchangementioning
confidence: 99%
See 1 more Smart Citation
“…Two factor authentication: As its name implies two factors means two authentication levels are used .As in the case of ATM, user swipes card, then enters a PIN (Personal Identification Number) code for the transaction to be done. Here the attacker must have the user's ATM card and PIN code to gain access [3]. 3.…”
Section: Introductionmentioning
confidence: 99%
“…Multi factor has many factors like passwords, fingerprints, smart card, voice, location, etc. Now, if the attackers get any one factor of the listed above he cannot get to the user's information [3]. 4.…”
Section: Introductionmentioning
confidence: 99%