Plan recognition scheme using multi-factors authentication for smart card online system
Authentication is one of the essential security features in network communication and ensures the system resources are not obtained by illegal users. In authentication process, the originator of the communication and the respondent will manage some identification codes of each other before to start...
| Main Authors: | Mohd Ariffin, Noor Afiza, Mohd Sani, Nor Fazlida |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
IEEE (IEEE Xplore)
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/38876/ |
Similar Items
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Online authentication using smart card technology in mobile phone infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
A novel and efficient bilateral remote user authentication
scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Efficient mutual authentication using kerberos for resource constraint smart meter in advanced metering infrastructure
by: Hasan, Md Mehedi, et al.
Published: (2023)
by: Hasan, Md Mehedi, et al.
Published: (2023)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2017)
by: Nematollahi, Mohammad Ali, et al.
Published: (2017)
A smart card (MyKad) and fingerprint authentication for e-voting system
by: Ismail, Rosli, et al.
Published: (2022)
by: Ismail, Rosli, et al.
Published: (2022)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Text and image: a new hybrid authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor
by: Ayad, Mustafa Abdsalam
Published: (2002)
by: Ayad, Mustafa Abdsalam
Published: (2002)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Enhance Luhn algorithm for validation of identity card numbers (ID card)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
A review of cryptographic impact in cybersecurity on smart grid: threat, challenges and countermeasures
by: Hasan, Md Mehedi, et al.
Published: (2021)
by: Hasan, Md Mehedi, et al.
Published: (2021)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Smart Card Implementation Model
by: Lee, Chin Huat
Published: (2000)
by: Lee, Chin Huat
Published: (2000)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
Smart Card Analysis: Malaysian Perspectives
by: Mohd Hatta, Kasuma Nurhazwani
Published: (2009)
by: Mohd Hatta, Kasuma Nurhazwani
Published: (2009)
LIKA: lightweight identity based key agreement protocol for secure data transmission in advanced metering infrastructure of smart grid
by: Hasan, Md Mehedi, et al.
Published: (2022)
by: Hasan, Md Mehedi, et al.
Published: (2022)
Door access using smart card
by: Foo, T.Y
Published: (2004)
by: Foo, T.Y
Published: (2004)
An improved secure authentication in lightweight IoT
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
The integration of fingerprint authentication with punch card system / Azliana Ghazali
by: Ghazali, Azliana
Published: (2004)
by: Ghazali, Azliana
Published: (2004)
Online greeting card website
by: Lim, Ching Yee
Published: (2023)
by: Lim, Ching Yee
Published: (2023)
Enhance luhn algorithm for validation of credit cards numbers.
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
An improved scheme for online recognition of control chart patterns
by: Hassan, Adnan
Published: (2011)
by: Hassan, Adnan
Published: (2011)
Review on user authentication on mobile devices
by: Abdul Gimba, Usman, et al.
Published: (2024)
by: Abdul Gimba, Usman, et al.
Published: (2024)
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Online business card / Linda Lim
by: Linda , Lim
Published: (2006)
by: Linda , Lim
Published: (2006)
Security failures in EMV smart card payment systems
by: Ahmad, Zubair, et al.
Published: (2016)
by: Ahmad, Zubair, et al.
Published: (2016)
Automatic smart card purchasing system for express kiosk
by: Toha, Siti Fauziah, et al.
Published: (2011)
by: Toha, Siti Fauziah, et al.
Published: (2011)
Similar Items
-
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016) -
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017) -
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008) -
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019) -
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)