A Novel User Authentication Scheme Based on QR-Code

@article{Liao2010ANU,
  title={A Novel User Authentication Scheme Based on QR-Code},
  author={Kuan-Chieh Liao and Wei-Hsun Lee},
  journal={J. Networks},
  year={2010},
  volume={5},
  pages={937-941}
}
User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel. Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access. Especially, the purpose of the one-time password is to make it more difficult to gain unauthorized… Expand
Lightweight Version of SQRL Authentication Protocol Based on Cryptography in the Cloud
TLDR
This paper proposes a new version of SQRL that uses cloud cryptography for the needed cryptographic operations thus providing a simple and natural answer to all the hard question raised by practical implementations and without eliminating any advantages of the oriainal protocol. Expand
Mutual authentications to parties with QR-code applications in mobile systems
TLDR
This work implemented a prototype using the proposed mutual authentication protocol for quick response code, a type of two-dimensional barcode that can be photographed and quickly decoded by smartphones and demonstrated how the prototype improves usability in a mobile communication system. Expand
2CAuth: A New Two Factor Authentication Scheme Using QR-Code
TLDR
An efficient, robust, scalable, and easy to use web authentication system called '2CAuth' that combines the above factors with OTP and challenge response methods without requiring any time synchronization between user's mobile phone and service provider's server for authentication purpose. Expand
C-Auth : A New Scheme for Enhancing Security Narasimhan Harini and
A multi factor authentication scheme called ’3C-Auth’ is proposed in this paper. The scheme carries out a comprehensive authentication process using the smart card, secret-pin, registered fingerExpand
3C-Auth: A New Scheme for Enhancing Security
  • 2015
A Novel QR Code and mobile phone based Authentication protocol via Bluetooth
TLDR
This work presents a novel mobile phone based authentication scheme, which intends to provide security and usability greater than that of traditional two-factor authentication protocols, and demonstrates that the new scheme fits for the complicated network environment. Expand
QR Code based secure OTP distribution scheme for Authentication in Net-Banking
Authentication is the process of verifying the identity of a user. One time passwords (OTP) play a vital role for authentication in net-banking to make it more secure. OTP are used to provide higherExpand
A Secure Image-Based Authentication Scheme Employing DNA Crypto and Steganography
TLDR
This paper proposes a novel two-way secure authentication scheme using DNA cryptography and steganography considering both security and usability and uses text and image password to authenticate legitimate user. Expand
QRP: An improved secure authentication method using QR codes
TLDR
The design and implementation of QRP is presented, an open source, proof-of-concept authentication system that uses a two-factor authentication by combining a password and a camera-equipped mobile phone, acting as an authentication token. Expand
QR Code Based Secure OTP Distribution Scheme for Authentication in Net-Banking
TLDR
This paper is presenting a new authentication scheme for secure OTP distribution in net banking through QR codes and email and aims to provide higher layer of security over static passwords that are prone to replay attacks. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 14 REFERENCES
An improved smart card based password authentication scheme with provable security
TLDR
This work shows that smart card based password authentication scheme and remote user authentication scheme are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. Expand
Secure remote user access over insecure networks
TLDR
This paper presents secure password-based protocols for remote user authentication, password change, and session key establishment over insecure networks that do not require the use of any additional private- or public-key infrastructure. Expand
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
TLDR
Security flaws of Yoon-Ryu-Yoo's protocols against masquerading attack, off-line password guessing attacks and parallel session attack resistance are pointed out. Expand
A new remote user authentication scheme using smart cards
TLDR
This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack. Expand
An Efficient and Practical Solution to Remote Authentication: Smart Card
TLDR
This work provides mutual authentication between the user and the server and achieves more functionality and requires much less computational cost than other smart card-based schemes. Expand
Password authentication with insecure communication
A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and theExpand
Contextual QR Codes
  • J. Rouillard
  • Computer Science
  • 2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)
  • 2008
TLDR
This paper proposes the notion of contextual QR codes that merge a public QR code and private information, in order to provide data related to a particular context. Expand
Two-Dimensional Bar-Code Decoding with Camera-Equipped Mobile Phones
  • T. Falas, Hossein Kashani
  • Computer Science
  • Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)
  • 2007
TLDR
This paper presents two-dimensional bar-code reading using camera phones, and it is argued that Java is a viable alternative if software is carefully crafted. Expand
Designing an Architecture for Delivering Mobile Information Services to the Rural Developing World
  • Tapan S. Parikh, E. Lazowska
  • Computer Science
  • Seventh IEEE Workshop on Mobile Computing Systems & Applications (WMCSA'06 Supplement)
  • 2006
TLDR
Supporting minimal navigation, direct linkage to paper practices and offline multimedia interaction, CAM is uniquely adapted to rural user, application and infrastructure constraints. Expand
An application and implementation of two-dimensional symbols for circuit board quality control system
The ability to accurately monitor and control productive pipelines is extremely important for quality control. Therefore, capturing data from printed circuit boards (PCB) or electronic components isExpand
...
1
2
...