PASSWORD ENCRYPTION BASED ON DYNAMIC GRAPH LABELING PRIORITY GENERATION (D.G.L.P.G.) TECHNIQUE
暂无分享,去创建一个
[2] Okkyung Choi,et al. Two-factor authentication system based on extended OTP mechanism , 2013, Int. J. Comput. Math..
[3] Jenq-Shiou Leu,et al. Design of a time and location based One-Time Password authentication scheme , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[4] Abhilash Shukla,et al. Security using 3D Password , 2015 .
[5] P. Balamuralidhar,et al. One time password authentication scheme based on elliptic curves for Internet of Things (IoT) , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).
[6] Fred Cheng. Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm , 2011, Mob. Networks Appl..
[7] Paul Dowland,et al. Secure Graphical One Time Password (GOTPass): An Empirical Study , 2015, Inf. Secur. J. A Glob. Perspect..
[8] Muhammad Khurram Khan,et al. OTP-Based Two-Factor Authentication Using Mobile Phones , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[9] Sumaiya Thaseen,et al. GENERATION OF SECURE ONE -TIME PASSWORD BASED ON IMAGE AUTHENTICATION , 2012 .
[10] Neha Vishwakarma,et al. Secure Image Based One Time Password , 2016 .
[11] Vishal Kolhe,et al. Secure Authentication with 3D Password , 2013 .
[12] Krishna M. Sivalingam,et al. An efficient One-Time Password authentication scheme using a smart card , 2009, Int. J. Secur. Networks.
[14] Xiaoping Li,et al. Research on the S / KEY one-time password authentication system and its application in banking and financial systems , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[15] D. Sumathy. OTP Encryption Techniques in Mobiles forAuthentication and Transaction Security , 2014 .
[16] Weizhong Qiang,et al. Cloud Authentication Based on Anonymous One-Time Password , 2013 .
[17] S. Ramesh,et al. Implementing One Time Password based security mechanism for securing personal health records in cloud , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[18] Ashwini A. Khatpe,et al. 3D LoginFor More Secure Authentication , 2014 .
[19] Chun-Ying Huang,et al. Using one-time passwords to prevent password phishing attacks , 2011, J. Netw. Comput. Appl..
[20] Varun Gandhi,et al. New Era of authentication: 3-D Password , 2012 .