2019
DOI: 10.1109/tifs.2018.2866025
|View full text |Cite
|
Sign up to set email alerts
|

OTPaaS—One Time Password as a Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 57 publications
(27 citation statements)
references
References 26 publications
0
25
0
Order By: Relevance
“…Conventional password-based authentication is taken into account inadequate by users as many online services began to affect one another. Online credentials are wont to recover other credentials and sophisticated attacks are directed to the weakest one among many of those online credentials [1]. As researchers are trying to find new authentication techniques, just one occasion passwords, which may be a two-factor authentication scheme, seems like a natural enhancement over conventional username/password schemes.…”
Section: Related Work a Literature Surveymentioning
confidence: 99%
See 3 more Smart Citations
“…Conventional password-based authentication is taken into account inadequate by users as many online services began to affect one another. Online credentials are wont to recover other credentials and sophisticated attacks are directed to the weakest one among many of those online credentials [1]. As researchers are trying to find new authentication techniques, just one occasion passwords, which may be a two-factor authentication scheme, seems like a natural enhancement over conventional username/password schemes.…”
Section: Related Work a Literature Surveymentioning
confidence: 99%
“…As researchers are trying to find new authentication techniques, just one occasion passwords, which may be a two-factor authentication scheme, seems like a natural enhancement over conventional username/password schemes. The manuscript places the OTP verifier to the cloud to ease adoption of its usage by cloud service providers [1]. When the OTP verifier is placed on the cloud as a service, other cloud service providers could outsource their OTP deployments also as cloud users could activate their respective account on the OTP provider on several cloud services [1].…”
Section: Related Work a Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…Otherwise, gMTD deceives the attackers who attempt to infiltrate the system by redirecting their messages to the decoy-hole module [18,19]. In gMTD, the OTBS was designed inspired by the OTP mechanism [20,21] and refers to a bit sequence used to mutate the communication protocols between the user and the server system. The OTBS is generated separately for each user during user registration and is shared between the user and the server system.…”
Section: Introductionmentioning
confidence: 99%