2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) 2019
DOI: 10.1109/eiconrus.2019.8656839
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Protocols Based on One-Time Passwords

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…Besides, we compare MOTP with recent works, i.e., T/Key and SmartOTPs. We refer to [ 26 ] for the four properties of comparison, and Table 6 shows a property comparison between five schemes. + represents that the scheme supports the property, and − means that the scheme does not support it.…”
Section: Resultsmentioning
confidence: 99%
“…Besides, we compare MOTP with recent works, i.e., T/Key and SmartOTPs. We refer to [ 26 ] for the four properties of comparison, and Table 6 shows a property comparison between five schemes. + represents that the scheme supports the property, and − means that the scheme does not support it.…”
Section: Resultsmentioning
confidence: 99%
“…They also often intersect with smart-card based technology [ 32 ] rather than being applied independently in a widely deployable manner for evolution of current paradigms. Various methods which have adopted hash-chains exist, including [ 33 , 34 , 35 ]. These proposals have largely implemented hash-chains for the purpose of producing one-time passwords as described above and detailed in [ 33 ], or for helping facilitate secure methods of peer-to-peer communication outside of centrally signed authorities [ 35 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
“…In [ 33 ], multiple hash chain protocols are compared next to typical hash authentication means. These include Lamport’s Hash Chain protocol, YSH protocol, the Bicakci Protocol, and the HOTP and TOTP protocols among others.…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
See 2 more Smart Citations