Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,732,007 papers from all fields of science
Search
Sign In
Create Free Account
HMAC-based One-time Password Algorithm
Known as:
HOTP
, Hash-Based One-time Password Algorithm
HOTP is an HMAC-based one-time password (OTP) algorithm. It is a cornerstone of Initiative For Open Authentication (OATH). HOTP was published as an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Android
BlackBerry
Chrome OS
Google Authenticator
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Scalable authentication for integration server
Zdenek Martinasek
,
L. Malina
,
V. Zeman
International Conference on Telecommunications…
2015
Corpus ID: 334459
The paper deals with the scalable authentication schemes for a integration server. The integration server is essentially a cloud…
Expand
2014
2014
One Time Password Generator System
Tamanna Saini
,
A. Garg
2014
Corpus ID: 14083383
Earlier static ID and Password are used which is vulnerable against eavesdropping and replay attack. To overcome this problem One…
Expand
2014
2014
ANALYTICAL APPROACH OF COST-EFFECTIVE AND SECURE SIP-BASED MOBILITY MANAGEMENT SCHEME FOR NEMO ENVIRONMENTS
Chulhee Cho
,
Jun-Dong Cho Jongpil Jeong Jae-Young Choi
2014
Corpus ID: 18889441
The mobile Virtual Private Network (MVPN) of the Internet Engineering Task Force (IETF) is not designed to support NEtwork…
Expand
2012
2012
Internet Banking Two-Factor Authentication using Smartphones
C. A. Soare
2012
Corpus ID: 55802932
This paper describes a method of implementing two-factor authentication using smart phones as software tokens. The proposed…
Expand
2012
2012
HOTP-Based Key Agreement Protocol Over Home Network
Hyunsung Kim
,
Hyunjee Kim
2012
Corpus ID: 53839447
Recently, Interest usage in home network is increasing rapidly with the rapid growth of Internet users and wireless devices. For…
Expand
2012
2012
MAVE, NEW LIGHTWEIGHT DIGITAL SIGNATURE PROTOCOLS FOR MASSIVE VERIFICATIONS
Sergio Demián
2012
Corpus ID: 42293000
In this paper we propose new decentralized digital signature protocols to allow massive bulk verifications (MAVE). The protocols…
Expand
2011
2011
Using the HMAC-Based One-Time Password Algorithm for TLS Authentication
Balkis Hamdane
,
A. Serhrouchni
,
Adrien Montfaucon
,
Sihem Guemara
Conference on Network and Information Systems…
2011
Corpus ID: 17890623
Transport Layer Security (TLS) constitutes the main protocol used to secure the exchanges in the Internet. Indeed, this protocol…
Expand
2011
2011
OCRA: OATH Challenge-Response Algorithm
David M'Raïhi
,
Johan Rydell
,
S. Bajaj
,
S. Machani
,
D. Naccache
Request for Comments
2011
Corpus ID: 28615994
This document describes the OATH algorithm for challenge-response authentication and signatures. This algorithm is based on the…
Expand
2011
2011
Aleph and Borges
G. Brotherston
2011
Corpus ID: 25128752
as is known, Aleph began life in this world very long before we did, about five millennia ago, in the most privileged and closely…
Expand
2009
2009
SIP authentication based on HOTP
Thomas Guillet
,
R. Moalla
,
A. Serhrouchni
,
A. Obaid
International Conference on Information…
2009
Corpus ID: 15350611
Current authentications with a secret key are based on the Challenge-Response paradigm. This mechanism avoids the clear…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE