Papaspirou et al., 2022 - Google Patents
Security Revisited: Honeytokens meet Google AuthenticatorPapaspirou et al., 2022
- Document ID
- 5484066282220164929
- Author
- Papaspirou V
- Papathanasaki M
- Maglaras L
- Kantzavelou I
- Douligeris C
- Ferrag M
- Janicke H
- Publication year
- Publication venue
- 2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)
External Links
Snippet
In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors improved existing authentication procedures and …
- 238000000034 method 0 abstract description 37
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200404019A1 (en) | Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements | |
US8041954B2 (en) | Method and system for providing a secure login solution using one-time passwords | |
US8087068B1 (en) | Verifying access to a network account over multiple user communication portals based on security criteria | |
US10153901B2 (en) | System and method for verifying user identity in a virtual environment | |
US8997177B2 (en) | Graphical encryption and display of codes and text | |
Grassi et al. | Draft nist special publication 800-63b digital identity guidelines | |
US9038196B2 (en) | Method for authenticating a user requesting a transaction with a service provider | |
US20040225899A1 (en) | Authentication system and method based upon random partial digitized path recognition | |
Papaspirou et al. | A novel two-factor honeytoken authentication mechanism | |
Aravindhan et al. | One time password: A survey | |
Bani-Hani et al. | Online authentication methods used in banks and attacks against these methods | |
Papaspirou et al. | Security Revisited: Honeytokens meet Google Authenticator | |
San Martino et al. | Phishing Secrets: History, Effects, Countermeasures. | |
Boonkrong | Multi-factor authentication | |
Pakojwar et al. | Security in online banking services-A comparative study | |
Boonkrong | Methods and threats of authentication | |
Iyanda et al. | Development of two-factor authentication login system using dynamic password with SMS verification | |
Manjula et al. | Pre-authorization and post-authorization techniques for detecting and preventing the session hijacking | |
Van Oorschot et al. | Countering identity theft through digital uniqueness, location cross-checking, and funneling | |
CA2611549C (en) | Method and system for providing a secure login solution using one-time passwords | |
Papaspirou et al. | Cybersecurity revisited: Honeytokens meet google authenticator | |
Liou et al. | On improving feasibility and security measures of online authentication. | |
Certic | The Future of Mobile Security | |
Majdalawieh et al. | Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking | |
Chen | Trust management for a smart card based private eid manager |