An efficient authentication protocol of WLAN and its security proof

Author(s):  
Haojun Zhang ◽  
Li Chen
2019 ◽  
Vol 15 (4) ◽  
pp. 784-794
Author(s):  
N.V. Kormil'tsev ◽  
◽  
A.D. Uvarov ◽  
A.A. Mikhailov ◽  
M.V. Tumbinskaya ◽  
...  

2019 ◽  
Vol 7 (5) ◽  
pp. 1551-1557
Author(s):  
Arif Mohammad Abdul ◽  
Sudarson Jena ◽  
M Bal Raju

2017 ◽  
Vol 9 (1) ◽  
pp. 30-35
Author(s):  
Sunderi Pranata ◽  
Hargyo Tri Nugroho ◽  
Hirofumi Yamaki

It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection.  Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP


2009 ◽  
Vol 31 (1) ◽  
pp. 176-183
Author(s):  
Xiao-Feng WANG ◽  
Jing ZHANG ◽  
Shang-Ping WANG

2013 ◽  
Vol 33 (5) ◽  
pp. 1350-1352
Author(s):  
Peng LIU ◽  
Changhong ZHANG ◽  
Qingyu OU

Sign in / Sign up

Export Citation Format

Share Document