2019
DOI: 10.35940/ijitee.i8919.078919
|View full text |Cite
|
Sign up to set email alerts
|

A Stable and Secure One-Time-Password Generation Mechanism using Fingerprint Features

Abstract: The growth of online application used for financial transactions and transferring personal information is increasingly common on internet and in mobile communication. These applications require authenticating legitimate users by assigning digital identities. Static passwords are perhaps most common type of credentials used today to authenticate the users. To avoid tedious task of remembering passwords, users often behave less securely by using low entropy and weak passwords, thus presenting security threats to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…The analysis shows that a more significant part of the OTP computation procedures depends on time synchronization, numerical calculations to generate one-time passwords. The arbitrariness of these OTP frameworks breaks after a timeframe and consequently, passwords become foreseeable (Choi and Kwon, 2015; Lone and Mir, 2019).…”
Section: Open Issues and Challengesmentioning
confidence: 99%
See 3 more Smart Citations
“…The analysis shows that a more significant part of the OTP computation procedures depends on time synchronization, numerical calculations to generate one-time passwords. The arbitrariness of these OTP frameworks breaks after a timeframe and consequently, passwords become foreseeable (Choi and Kwon, 2015; Lone and Mir, 2019).…”
Section: Open Issues and Challengesmentioning
confidence: 99%
“…The analysis shows that a more significant part of the OTP computation procedures depends on time synchronization, numerical calculations to generate one-time passwords. The arbitrariness of these OTP frameworks breaks after a timeframe and consequently, passwords become foreseeable (Choi and Kwon, 2015; Lone and Mir, 2019). Weak password generation methods, such as MD5, AES, SHA-1 and others, are used in most authentication schemes (Alzomai, 2010; Deore and Waghmare, 2016), leaving them vulnerable and struggling to help on time owing to technical advances.…”
Section: Open Issues and Challengesmentioning
confidence: 99%
See 2 more Smart Citations