Publication Type:

Journal Article

Source:

International Journal of Engineering and Technology, Volume 5, Number 2, p.1087-1094 (2013)

URL:

http://www.scopus.com/inward/record.url?eid=2-s2.0-84878400906&partnerID=40&md5=617aa752e1d9441b15556041a1522b6a

Abstract:

Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading off usability. In this paper we present '2CAuth' a new two factor authentication scheme that enhances secure usage of application information and preserves usability, without sacrificing user's privacy. A significant feature of the scheme is that it DOES NOT call for any synchronization between Mobile Network Operator (MNO) and users. The analysis of the scheme clearly brings out its effectiveness in terms of its usability even at times of peak loads on mobile networks. The scheme has the dual advantage of carrying out the verification of transactions which involve the physical presence of the user as well as those to be done in his absence.

Notes:

cited By (since 1996)0

Cite this Research Publication

Dr. Harini N. and Padmanabhan, T. R., “2CAuth: A new two factor authentication scheme using QR-code”, International Journal of Engineering and Technology, vol. 5, pp. 1087-1094, 2013.

207
PROGRAMS
OFFERED
5
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
9th
RANK(INDIA):
NIRF 2017
150+
INTERNATIONAL
PARTNERS