2018
DOI: 10.1007/978-3-319-99010-1_39
|View full text |Cite
|
Sign up to set email alerts
|

Two-Factor Authentication Scheme Using One Time Password in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…These performance measures were compared to other recent competing encryption approaches which use a combination of symmetric and/or asymmetric algorithms. These algorithms are: Subasree algorithm [9], Kumar algorithm [10], Zhu algorithm [11], THCA algorithm [12], and SCBRP algorithm [13]. The proposed algorithm was implemented using C# programming language and the simulations were run on an Intel i5-3317U 1.70 GHz CPU with 4.00 GB of RAM using 64-bit implementations to ensure maximum utilization of the hardware.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…These performance measures were compared to other recent competing encryption approaches which use a combination of symmetric and/or asymmetric algorithms. These algorithms are: Subasree algorithm [9], Kumar algorithm [10], Zhu algorithm [11], THCA algorithm [12], and SCBRP algorithm [13]. The proposed algorithm was implemented using C# programming language and the simulations were run on an Intel i5-3317U 1.70 GHz CPU with 4.00 GB of RAM using 64-bit implementations to ensure maximum utilization of the hardware.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Many authentication schemes were proposed to authenticate users in cloud, but a lot of them had some security troubles. The previous work in authentication process suffered from some problems [10,11]. These problems can be summarized in using mobile phone applications, using extra hardware, receiving message through the internet, and extra time to identity the user.…”
Section: Introductionmentioning
confidence: 99%
“…One of the most important tactics is the manipulation one, as its effects are usually not noticed immediately, and so the damage on the cyber physical system can be larger; apart from that, it is the less analyzed tactic until now. In this tactic, we have identified a new research line that has to do with the identification of subcategories for manipulation families that are stated here, in order to refine the taxonomy and to cover all the relevant particular techniques; for example, inside the falsification family we could mention spoofing, a family of techniques in which an actor successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage [1].…”
Section: Introductionmentioning
confidence: 99%
“…One of the most important tactics is the manipulation one, as its effects are usually not noticed immediately, and so the damage on the cyber physical system can be larger; apart from that, it is the less analyzed tactic until now. In this tactic, we have identified a new research line that has to do with the identification of subcategories for manipulation families that are stated here, in order to refine the taxonomy and to cover all the relevant particular techniques; for example, inside the falsification family we could mention spoofing, a family of techniques in which an actor successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage [191].…”
Section: Introductionmentioning
confidence: 99%