IET International Conference on Wireless Communications and Applications (ICWCA 2012) 2012
DOI: 10.1049/cp.2012.2111
|View full text |Cite
|
Sign up to set email alerts
|

Improved look-ahead re-synchronization window for HMAC-based one-time password

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The counter is incremented separately than by both parties. As HOTP does not have the time-based constraint, it is somewhat easier to use yet might be more susceptible to brute force attacks that is because of the long window in which HOTP is valid (Beikverdi and Tan, 2012; Mathews and Panchami, 2017; HMAC-based One-Time Password-Wikipedia, 2020).…”
Section: Background and Related Workmentioning
confidence: 99%
“…The counter is incremented separately than by both parties. As HOTP does not have the time-based constraint, it is somewhat easier to use yet might be more susceptible to brute force attacks that is because of the long window in which HOTP is valid (Beikverdi and Tan, 2012; Mathews and Panchami, 2017; HMAC-based One-Time Password-Wikipedia, 2020).…”
Section: Background and Related Workmentioning
confidence: 99%