Quantum One Time Password with Biometrics
暂无分享,去创建一个
[1] Hongfeng Zhu. One-time identity-password authenticated key agreement scheme based on biometrics , 2015, Secur. Commun. Networks.
[2] Z. Zareh Hosseini,et al. Enhancement of security with the help of real time authentication and one time password in e-commerce transactions , 2013, The 5th Conference on Information and Knowledge Technology.
[3] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[4] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[5] Christophe Rosenberger,et al. One-Time Biometrics for Online Banking and Electronic Payment Authentication , 2014, CD-ARES.
[6] Varsha Nagpurkar,et al. Securing SMS Based One Time Password Technique from Man in the Middle Attack , 2014, ArXiv.
[7] David M'Raïhi,et al. TOTP: Time-Based One-Time Password Algorithm , 2011 .
[8] Yoon-Ho Kim,et al. Single-photon two-qubit entangled states: preparation and measurement , 2005, 2005 Quantum Electronics and Laser Science Conference.
[9] Craig Metz,et al. A One-Time Password System , 1996, RFC.
[10] E. Rieffel,et al. Quantum Computing: A Gentle Introduction , 2011 .
[11] Bruce Schneier,et al. Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.
[12] Andris Ambainis,et al. Quantum Attacks on Classical Proof Systems: The Hardness of Quantum Rewinding , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[13] Manisha J. Nene,et al. One time pad generation using quantum superposition states , 2016, 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[14] Yong Wang,et al. Mobile payment security, threats, and challenges , 2016, 2016 Second International Conference on Mobile and Secure Services (MobiSecServ).
[15] Campus Universitário,et al. A FORMAL CLASSIFICATION OF INTERNET BANKING ATTACKS AND VULNERABILITIES , 2011 .
[16] Che-Hung Liu,et al. Evaluating and selecting the biometrics in network security , 2015, Secur. Commun. Networks.
[17] Hassan M. Elkamchouchi,et al. Mobile one-time passwords: two-factor authentication using mobile phones , 2012, Secur. Commun. Networks.
[18] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[19] Ashish Jain,et al. An Improved Genetic Algorithm for Developing Deterministic OTP Key Generator , 2017, Complex..