Detailed Information

Cited 0 time in webofscience Cited 13 time in scopus
Metadata Downloads

A design of one-time password mechanism using public key infrastructure

Full metadata record
DC Field Value Language
dc.contributor.authorKim, H.-C.-
dc.contributor.authorLee, H.-W.-
dc.contributor.authorLee, K.-S.-
dc.contributor.authorJun, M.-S.-
dc.date.available2019-04-10T11:20:06Z-
dc.date.created2018-04-17-
dc.date.issued2008-
dc.identifier.isbn9780769533223-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/33658-
dc.description.abstractOne-time password mechanism solves password problems like password conjecture and wiretapping that can occur by using the same password several times repeatedly. However, such one-time password mechanism also is exposed to various attacks, and is vulnerable in matters of confidentiality and security protection, the most important elements of security depending on mechanism. This paper solves user disguise problem by authenticating users with the use of public key infrastructure, and guarantees integrity by generating password by applying session identifier L and random value R to hash function in every applicable session. Additionally, to enhance security while transferring the generated password, the mechanism digital signature the password with user's private key, encode it again with service provider's public key, and guarantee denial prevention by requesting the server authentication while being able to verify the identity of user. Therefore in this paper proposes one-time password mechanism that has enhanced security using public key infrastructure to prevent integrity problem due to birthday attack and hash collision problem occurring from hash function. Comparison and analysis of existing one-time password mechanism will tell of the excellence of this paper. © 2008 IEEE.-
dc.relation.isPartOfProceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008-
dc.titleA design of one-time password mechanism using public key infrastructure-
dc.typeConference-
dc.identifier.doi10.1109/NCM.2008.77-
dc.type.rimsCONF-
dc.identifier.bibliographicCitation4th International Conference on Networked Computing and Advanced Information Management, NCM 2008, v.1, pp.18 - 24-
dc.description.journalClass2-
dc.identifier.scopusid2-s2.0-57849140658-
dc.citation.conferenceDate2008-09-02-
dc.citation.conferencePlaceGyeongju-
dc.citation.endPage24-
dc.citation.startPage18-
dc.citation.title4th International Conference on Networked Computing and Advanced Information Management, NCM 2008-
dc.citation.volume1-
dc.contributor.affiliatedAuthorJun, M.-S.-
dc.type.docTypeConference Paper-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Computer Science and Engineering > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE