References
- S. Babkin, A. Epishkina, One-time passwords: resistance to masquerade attack, Procedia computer science 145, pp. 199–203, (2018), DOI: 10.1016/j.procs.2018.11.040.
- S.A.E. Booz, G. Attiya, N.E. Fishawy, A secure cloud storage system combining time-based one-time password and automatic blocker protocol, EURASIPjournal on information security, 2016:13, (2016), DOI: https://doi.org/10.1186/s13635-016-0037-0.
- Khan, Tayyab, Karan Singh, Mohamed Abdel-Basset, Hoang Viet Long, Satya P. Singh, and Manisha Manjul. “A Novel and Comprehensive Trust Estimation Clustering-Based Approach for Large Scale Wireless Sensor Networks.” IEEE Access, vol. 7, pp. 58221-58240, (2019). doi: 10.1109/ACCESS.2019.2914769
- Digital identity guidelines, authentication and lifecycle management, NIST special publication 800-63B, (2017), DOI: https://doi.org/10.6028/NIST.SP.800-63b.
- Facebook one-time passwords can be stolen, says security company, (2016) available at https://www.tomshardware.com/news/face-book-one-time-passwords-ss7vulnerability,32112.html.
- T. Kansuwan, T. Chomsiri, Authentication model using the bundled CAPTCHA OTP instead of traditional password, Joint international conference on digital arts, media and technology with ECTI northern section conference on electrical, electronics, computer and telecommunications engineering (ECTI DAMT-NCON), pp. 5-8, (2019), DOI: 10.1109/EC-TI-NCON.2019.8692255.
- P.G. Kelley, S. Komanduri, M.L. Mazurek, R. Shay, T.V.L Bauer, N. Christin, L.F. Cranor, J. Lopez, Guess again (and again and again): measuring password strength by simulating password-cracking algorithms, 2012 IEEE symposium on security and privacy, pp. 523-537, (2012), DOI: 10.1109/SP.2012.38.
- G. Kumar, H. Saini, Novel non commutative cryptography scheme using extra special group, Security and communication networks, volume 2017, article ID 9036382, pp. 1-12, (2017), DOI: https://doi.org/10.1155/2017/9036382.
- C-H Ling , C-C Lee , C-C Yang, M-S Hwang, A secure and efficient one-time password authentication scheme for WSN, International journal of network security, volume 19, number 2, pp. 177-181, (2017), DOI: 10.6633/IJNS.201703.19(2).02.
- Y. Luo, X. Lai, T. Jia, Attacks on a double length block cipher-based hash proposal, Cryptography and communications, volume 7, issue 3, pp. 289-295, (2015), DOI: https://doi.org/10.1007/s12095-014-0117-2.
- C. Mulliner, R Borgaonkar, P Stewin, J-P Seifert, SMS-based one-time passwords: attacks and defense, International conference on detection of intrusions and malware, and vulnerability assessment, DIMVA 2013, pp. 150-159, (2013), DOI: https://doi.org/10.1007/978-3-642-39235-1_9.
- RFC 4226 available at https://tools.ietf.org/html/rfc4226.
- RFC 6238 available at https://tools.ietf.org/html/rfc6238.
- N. Sonaniya, How I bypassed state bank of India OTP, (2017), available at https://hackernoon.com/how-i-bypassed-state-bank-of-india-otp-f145469a9f1d.
- P. Subpratatsavee, P. Kuacharoen, Transaction authentication using HMAC-based one-time password and QR code, Computer science and its applications, Part of the lecture notes in electrical engineering book series (LNEE, volume 330), pp. 93-98, (2015), DOI: https://doi.org/10.1007/978-3-662-45402-2_14.
- M.L.T. Uymatiao, W.E.S. Yu, Time-based OTP authentication via secure tunnel (TOAST): a mobile TOTP scheme using TLS seed exchange and encrypted offline keystore, 4th IEEE international conference on information science and technology, Shenzhen, China, (2014), DOI: 10.1109/ICIST.2014.6920371.
- J.L. Vagle, Furtive encryption: power, trust, and the constitutional cost of collective surveillance, Indiana law journal, volume 90, number 101, pp. 101-150, (2015), available at http://ilj.law.indiana.edu/articles/11-Vagle.pdf
- M.R. Valluri, Authentication schemes using polynomials over noncommutative rings, International journal on cryptology and information security, volume 2, number 4, pp. 51-58, (2012), available at https://wireilla.com/papers/ijcis/V2N4/2412ijcis06.pdf.
- Lee, Cheng-Chi, Kou-You Huang, and Shiow-Yuan Huang. “On-line password guessing attack on Lu-Cao key agreement protocol for secure authentication.” Journal of Discrete Mathematical Sciences and Cryptography 12.5 (2009): 595-598. doi: 10.1080/09720529.2009.10698258
- Dinker, Aarti Gautam, et al. “Multilevel authentication scheme for security critical networks.” Journal of Information and Optimization Sciences 39.1 (2018): 357-367. doi: 10.1080/02522667.2017.1374745