2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) 2016
DOI: 10.1109/ic3i.2016.7918008
|View full text |Cite
|
Sign up to set email alerts
|

Two factor verification using QR-code: A unique authentication system for Android smartphone users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 2 publications
0
14
0
Order By: Relevance
“…In the case of physical effort, the process of entering an ID and password is more mobile than expected because it uses a mouse and keyboard to enter characters. Recently, additional authentication methods using secondary passwords and QR codes [5] have been utilized by utilizing smartphones [4] to increase security. This method is certainly highly reliable in security, but there is a hassle of unlocking a smartphone, using an application, or checking a message and entering it back into the computer.…”
Section: A Id-password Authenticationmentioning
confidence: 99%
“…In the case of physical effort, the process of entering an ID and password is more mobile than expected because it uses a mouse and keyboard to enter characters. Recently, additional authentication methods using secondary passwords and QR codes [5] have been utilized by utilizing smartphones [4] to increase security. This method is certainly highly reliable in security, but there is a hassle of unlocking a smartphone, using an application, or checking a message and entering it back into the computer.…”
Section: A Id-password Authenticationmentioning
confidence: 99%
“…On the client-side, a user must scan it with his/her smartphone using a relevant application. A scheme was proposed by Rodrigues et al [11]. It uses QR technology to create a 2nd Factor.…”
Section: B Quick Response Codes (Qr)mentioning
confidence: 99%
“…RSA SecurID [14] and Google Authenticator [15] are well-known examples of OTP implementation. Unfortunately, common OTP mechanisms such as [16,17] have the possibility of vulnerability on the server side. When compromised, attackers might obtain the shared secrets and compute the OTP to authenticate.…”
Section: Related Workmentioning
confidence: 99%