2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS) 2019
DOI: 10.1109/iotsms48152.2019.8939261
|View full text |Cite
|
Sign up to set email alerts
|

Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…As the field of blockchain-based authentication and authorization continues to evolve, addressing these critical gaps becomes pivotal to advancing the scheme's effectiveness and ensuring its relevance in the context of modern privacy expectations. Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication [13].The paper introduces a method for enhancing graphical password authentication using Twofish Encryption and Visual Cryptography (TEVC). The TEVC method is designed to be unpredictable and easier to manage than traditional alphanumeric password systems.…”
Section: Breaking Mobile Notification-based Authentication Withmentioning
confidence: 99%
“…As the field of blockchain-based authentication and authorization continues to evolve, addressing these critical gaps becomes pivotal to advancing the scheme's effectiveness and ensuring its relevance in the context of modern privacy expectations. Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication [13].The paper introduces a method for enhancing graphical password authentication using Twofish Encryption and Visual Cryptography (TEVC). The TEVC method is designed to be unpredictable and easier to manage than traditional alphanumeric password systems.…”
Section: Breaking Mobile Notification-based Authentication Withmentioning
confidence: 99%
“…It is designed by Bruce Schneier [29][30][31][32] and has chosen to be one of the five finalists of the Advanced Encryption Standard contest. Twofish is a varied key size algorithm with 128 bits block size.…”
Section: Overview Of the Twofish Algorithmmentioning
confidence: 99%
“…Graphical password authentication was improved upon by Gulsezim et al [15] with the Twofish Encryption and Visual Cryptography (TEVC) algorithm's utilization. There is an unpredictable organization of this proposed TEVC since it is much tougher to predict the correct graphical password and sort its particles into the appropriate order compared to the standard alphanumeric password system.…”
Section: Literature Surveymentioning
confidence: 99%