A novel authentication scheme to increase security for non-repudiation of users
Protection of sensitive information is a growing concern worldwide. Failure to protect sensitive information can lead to loss of clients in the banking sector or threaten national security. Access to sensitive information starts with e-authentication. Most authentication systems are designed for aut...
| Main Authors: | Hussein, Khalid Waleed, Mohd. Sani, Nor Fazlida, Mahmod, Ramlan, Abdullah@Selimun, Mohd. Taufik |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
CMR Institute of Technology
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30637/ http://psasir.upm.edu.my/id/eprint/30637/1/A%20novel%20authentication%20scheme%20to%20increase%20security%20for%20non.pdf |
Similar Items
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Non-Repudiation In Web Services.
by: Ling, Elvis,Ing Seng, et al.
Published: (2007)
by: Ling, Elvis,Ing Seng, et al.
Published: (2007)
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Non-repudiation in order, delivery and payment process for a sustainable online business
by: Abd Rahman, Abdullah Sani, et al.
Published: (2011)
by: Abd Rahman, Abdullah Sani, et al.
Published: (2011)
Enhance luhn algorithm for validation of credit cards numbers.
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Enhance Luhn algorithm for validation of identity card numbers (ID card)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Cellular automata based user authentication scheme using identity-bits commitment for wireless sensor network
by: Jamil, Norziana, et al.
Published: (2011)
by: Jamil, Norziana, et al.
Published: (2011)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
A novel and efficient bilateral remote user authentication
scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Plan recognition scheme using multi-factors authentication for smart card online system
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008)
by: Ramamoorthy, Viknesh
Published: (2008)
Fast and secure handover authentication scheme in Mobile WiMax
by: Zmezm, Hamzah F., et al.
Published: (2014)
by: Zmezm, Hamzah F., et al.
Published: (2014)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
A secure authentication scheme using locimetric and press touch code techniques
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
Advancing security measures: A brainwave-based biometric system for user identification and authentication
by: Muhammad Nur Arif, Mohd Farid, et al.
Published: (2024)
by: Muhammad Nur Arif, Mohd Farid, et al.
Published: (2024)
Watermark blending technique for securing user authentication data in mobile application systems
by: Mohamed, Kartini, et al.
Published: (2019)
by: Mohamed, Kartini, et al.
Published: (2019)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
An effective security alert mechanism for real-time phishing tweet detection on twitter
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A single photon quantum user bi-directional authentication scheme over noiseless channel
by: Buhari, Abudhahir, et al.
Published: (2012)
by: Buhari, Abudhahir, et al.
Published: (2012)
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Review on user authentication on mobile devices
by: Abdul Gimba, Usman, et al.
Published: (2024)
by: Abdul Gimba, Usman, et al.
Published: (2024)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
Measuring computer security awareness on internet banking and shopping for internet users
by: Sidi, Fatimah, et al.
Published: (2013)
by: Sidi, Fatimah, et al.
Published: (2013)
Graphical user authentication algorithm for mobile banking user
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
An improved secure authentication in lightweight IoT
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Similar Items
-
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013) -
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013) -
Non-Repudiation In Web Services.
by: Ling, Elvis,Ing Seng, et al.
Published: (2007) -
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016) -
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)