COMPARATIVE ANALYSIS OF ONE TIME PASSWORD AUTHENTICATION ARCHITECTURES USING MOBILE DEVICES

被引:0
作者
Stoica, Marian [1 ]
Trif, Silvia [1 ]
机构
[1] Acad Econ Studies, Bucharest, Romania
来源
INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY | 2012年
关键词
one time password authentication; mobile architectures; mobile device; security; architecture complexity;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
This paper aims to presents a comparative analysis of the onetime password authentication architectures using mobile devices. The onetime password authentication architectures are presented. The flow for each architecture is described. Relevant characteristics are identified in order to assess the architectures. Identified characteristics are used to choose optimum architecture with respect to criteria.
引用
收藏
页码:91 / 96
页数:6
相关论文
共 49 条
  • [31] SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices
    Khan, Rasib
    Hasan, Ragib
    Xu, Jinfang
    2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 41 - 50
  • [32] Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Wu, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 2052 - 2064
  • [33] Time series modeling using mobile devices and broadband internet
    Prat, A
    Solé, I
    Remondo, D
    Martinez, D
    Catot, JM
    COMPSTAT 2002: PROCEEDINGS IN COMPUTATIONAL STATISTICS, 2002, : 599 - 604
  • [34] Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card
    Prakasha, Krishna
    Muniyal, Balachandra
    Acharya, Vasundhara
    IEEE ACCESS, 2019, 7 : 17981 - 18007
  • [35] Towards Implicit Enhancement of Security and User Authentication in Mobile Devices Based on Movement and Audio Analysis
    Ketabdar, Hamed
    Roshandel, Mehran
    Skripko, Daria
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER-HUMAN INTERACTIONS (ACHI 2011), 2011, : 188 - 191
  • [36] A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions
    Khalil, Usman
    Malik, Owais Ahmed
    Uddin, Mueen
    Chen, Chin-Ling
    SENSORS, 2022, 22 (14)
  • [37] eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices
    Kuseler, Torben
    Lami, Ihsan
    Jassim, Sabah
    Sellahewa, Harin
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2010, 2010, 7708
  • [38] OWNER AUTHENTICATION FOR MOBILE DEVICES USING MOTION GESTURES BASED ON MULTI-OWNER TEMPLATE UPDATE
    Karita, Shigeki
    Nakamura, Kumi
    Kono, Kazuhiro
    Ito, Yoshimichi
    Babaguchi, Noboru
    2015 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA & EXPO WORKSHOPS (ICMEW), 2015,
  • [39] User-centred multimodal authentication: securing handheld mobile devices using gaze and touch input
    Khamis, Mohamed
    Marky, Karola
    Bulling, Andreas
    Alt, Florian
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2022, 41 (10) : 2047 - 2069
  • [40] Pict-Place Authentication: Recognition-based Graphical Password using Image Layout for Better Balance of Security and Operation Time
    Takada, Tetsuji
    Yoshida, Mitsuhiro
    PROCEEDINGS OF THE 14TH BIANNUAL CONFERENCE OF THE ITALIAN SIGCHI CHAPTER (CHIITALY 2021), 2021,