Quantum One Time Password with Biometrics

[1]  Hongfeng Zhu One-time identity-password authenticated key agreement scheme based on biometrics , 2015, Secur. Commun. Networks.

[2]  Z. Zareh Hosseini,et al.  Enhancement of security with the help of real time authentication and one time password in e-commerce transactions , 2013, The 5th Conference on Information and Knowledge Technology.

[3]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[4]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[5]  Christophe Rosenberger,et al.  One-Time Biometrics for Online Banking and Electronic Payment Authentication , 2014, CD-ARES.

[6]  Varsha Nagpurkar,et al.  Securing SMS Based One Time Password Technique from Man in the Middle Attack , 2014, ArXiv.

[7]  David M'Raïhi,et al.  TOTP: Time-Based One-Time Password Algorithm , 2011 .

[8]  Yoon-Ho Kim,et al.  Single-photon two-qubit entangled states: preparation and measurement , 2005, 2005 Quantum Electronics and Laser Science Conference.

[9]  Craig Metz,et al.  A One-Time Password System , 1996, RFC.

[10]  E. Rieffel,et al.  Quantum Computing: A Gentle Introduction , 2011 .

[11]  Bruce Schneier,et al.  Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.

[12]  Andris Ambainis,et al.  Quantum Attacks on Classical Proof Systems: The Hardness of Quantum Rewinding , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.

[13]  Manisha J. Nene,et al.  One time pad generation using quantum superposition states , 2016, 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[14]  Yong Wang,et al.  Mobile payment security, threats, and challenges , 2016, 2016 Second International Conference on Mobile and Secure Services (MobiSecServ).

[15]  Campus Universitário,et al.  A FORMAL CLASSIFICATION OF INTERNET BANKING ATTACKS AND VULNERABILITIES , 2011 .

[16]  Che-Hung Liu,et al.  Evaluating and selecting the biometrics in network security , 2015, Secur. Commun. Networks.

[17]  Hassan M. Elkamchouchi,et al.  Mobile one-time passwords: two-factor authentication using mobile phones , 2012, Secur. Commun. Networks.

[18]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[19]  Ashish Jain,et al.  An Improved Genetic Algorithm for Developing Deterministic OTP Key Generator , 2017, Complex..