Information Systems Security
DOI: 10.1007/978-3-540-77086-2_20
|View full text |Cite
|
Sign up to set email alerts
|

A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…The main goal is to not submit the password in plaintext to an unauthenticated remote server but mutually authenticate client and server [16,42,47], utilize a zero-knowledge protocol to avoid transmitting confidential information [22], check for user-specific knowledge that changes over time [31], use trusted second devices to establish an authenticated session [34], generate site-specific passwords from a seed [39], or use bookmarks as a secure entry point [1].…”
Section: Sophisticated Authentication Protocolsmentioning
confidence: 99%
“…The main goal is to not submit the password in plaintext to an unauthenticated remote server but mutually authenticate client and server [16,42,47], utilize a zero-knowledge protocol to avoid transmitting confidential information [22], check for user-specific knowledge that changes over time [31], use trusted second devices to establish an authenticated session [34], generate site-specific passwords from a seed [39], or use bookmarks as a secure entry point [1].…”
Section: Sophisticated Authentication Protocolsmentioning
confidence: 99%
“…It performs a 2-way authentication and resists on-line and off-line dictionary attacks. SPEKE is used in APA with some modifications [14].…”
Section: E Communication Based Anti-phishing Techniquesmentioning
confidence: 99%
“…Furthermore, several alternatives and enhancements in respect to the form-based communication of passwords have been made, such as [223], [228], [240], or [159]. Most of these techniques were designed to prevent phishing attacks in general and were not specifically targeted at XSS attacks.…”
Section: Countering Attacks In the Application Contextmentioning
confidence: 99%