From the news
- Chancellor Amma Addresses the Parliament of World’s Religions
- Amrita Students Qualify for the European Mars Rover Challenge
Publication Type : Journal Article
Publisher : International Journal of Engineering and Technology
Source : International Journal of Engineering and Technology, Volume 5, Number 2, p.1087-1094 (2013)
Campus : Coimbatore
School : School of Engineering
Department : Computer Science
Verified : Yes
Year : 2013
Abstract : Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading off usability. In this paper we present '2CAuth' a new two factor authentication scheme that enhances secure usage of application information and preserves usability, without sacrificing user's privacy. A significant feature of the scheme is that it DOES NOT call for any synchronization between Mobile Network Operator (MNO) and users. The analysis of the scheme clearly brings out its effectiveness in terms of its usability even at times of peak loads on mobile networks. The scheme has the dual advantage of carrying out the verification of transactions which involve the physical presence of the user as well as those to be done in his absence.
Cite this Research Publication : Dr. Harini N. and Padmanabhan, T. R., “2CAuth: A new two factor authentication scheme using QR-code”, International Journal of Engineering and Technology, vol. 5, pp. 1087-1094, 2013.