Authentication Factor

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6426 Experts worldwide ranked by ideXlab platform

Daniel Loebenberger - One of the best experts on this subject based on the ideXlab platform.

  • Two-Factor Authentication for the Bitcoin protocol
    International Journal of Information Security, 2016
    Co-Authors: Christopher Mann, Daniel Loebenberger
    Abstract:

    We show how to realize two-Factor Authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter (Int J Inf Secur 2(3---4):218---239, 2004. doi:10.1007/s10207-004-0041-0) in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-Factor Authentication and verification over a separate channel. Since we use a smart phone as the second Authentication Factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking Authentication methods.

  • two Factor Authentication for the bitcoin protocol
    International Workshop on Security, 2015
    Co-Authors: Christopher Mann, Daniel Loebenberger
    Abstract:

    We show how to realize two-Factor Authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter 2004 in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-Factor Authentication and verification over a separate channel. Since we use a smart phone as the second Authentication Factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking Authentication methods.

  • two Factor Authentication for the bitcoin protocol
    2014
    Co-Authors: Christopher Mann, Daniel Loebenberger
    Abstract:

    We show how to realize two-Factor Authentication for a Bitcoin wal- let employing the two-party ECDSA signature protocol adapted from MacKen- zie & Reiter (2004). We also present a prototypic implementation of a Bitcoin wallet that offers both: two-Factor Authentication and verification over a sepa- rate channel. Since we use a smart phone as the second Authentication Factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking Authentication methods.

Christopher Mann - One of the best experts on this subject based on the ideXlab platform.

  • Two-Factor Authentication for the Bitcoin protocol
    International Journal of Information Security, 2016
    Co-Authors: Christopher Mann, Daniel Loebenberger
    Abstract:

    We show how to realize two-Factor Authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter (Int J Inf Secur 2(3---4):218---239, 2004. doi:10.1007/s10207-004-0041-0) in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-Factor Authentication and verification over a separate channel. Since we use a smart phone as the second Authentication Factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking Authentication methods.

  • two Factor Authentication for the bitcoin protocol
    International Workshop on Security, 2015
    Co-Authors: Christopher Mann, Daniel Loebenberger
    Abstract:

    We show how to realize two-Factor Authentication for a Bitcoin wallet. To do so, we explain how to employ an ECDSA adaption of the two-party signature protocol by MacKenzie and Reiter 2004 in the context of Bitcoin and present a prototypic implementation of a Bitcoin wallet that offers both: two-Factor Authentication and verification over a separate channel. Since we use a smart phone as the second Authentication Factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking Authentication methods.

  • two Factor Authentication for the bitcoin protocol
    2014
    Co-Authors: Christopher Mann, Daniel Loebenberger
    Abstract:

    We show how to realize two-Factor Authentication for a Bitcoin wal- let employing the two-party ECDSA signature protocol adapted from MacKen- zie & Reiter (2004). We also present a prototypic implementation of a Bitcoin wallet that offers both: two-Factor Authentication and verification over a sepa- rate channel. Since we use a smart phone as the second Authentication Factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking Authentication methods.

Ramzi Saifan - One of the best experts on this subject based on the ideXlab platform.

  • analysis of strong password using keystroke dynamics Authentication in touch screen devices
    Conference on Computational Complexity, 2016
    Co-Authors: Asma Salem, Dema Zaidan, Andraws Swidan, Ramzi Saifan
    Abstract:

    In this paper user verification and identification system on touch screen mobile devices is proposed. The system examines the keystroke dynamics and uses it as a second Authentication Factor. The study proposes a prototype for a keyboard application developed for collecting timing and non-timing information from keystroke dynamics. In addition to other mentioned in literature studies, we propose complex password combination, which consists of text, numbers, and special characters. Strengthening access control using artificial neural networking model is suggested. Neural network model based on multilayer perceptron classifier which uses back propagation algorithm is proposed. This paper presents a unique approach for combining timing and non-timing features together, as it includes several non-timing features such pressure, size, and position in addition to the duration time features. Several experiments have been done based on specific machine learning for data mining and classification toolkit named WEKA. The obtained results show that keystroke dynamics provides acceptable level of performance measures as a second Authentication Factor. The distinguishable role for non-timing features beside the timing features is demonstrated. These features have a significant role for improving the performance measures of keystroke dynamic behavioral Authentication. The proposed model achieves lower error rate of false acceptance of 2.2%, false rejection of 8.67%, and equal error rate of 5.43% which are better than most of references provided in the literature.

Jong Hwan Park - One of the best experts on this subject based on the ideXlab platform.

  • Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication
    IEEE Access, 2019
    Co-Authors: Jung Yeon Hwang, Jong Hwan Park
    Abstract:

    Fuzzy Authentication uses non-deterministic or noisy data, like biometrics, as an Authentication Factor. Although the data is extracted from the same individual or source, it can be different for each measurement. As a result, one of the main issues in fuzzy Authentication is the effective processing of the fuzziness, while guaranteeing the privacy of the fuzzy data. Biometric data is a typical user-generated fuzzy data and the fuzzy extractor is one of the most promising primitives for biometric Authentication these days. In 2016, Canetti et al. proposed the reusable fuzzy extractor, in which multiple keys can be generated with the same biometric data. It can also handle some outliers which occur unexpectedly (owing to an external interference when acquiring the fuzzy data, for example, the presence of dust on a fingerprint image). However, the size of the user's helper data in the reusable fuzzy extractor is quite large. This makes the network bandwidth usage required in the online Authentication phase (or the storage required on the user side) considerable, which inconveniences the user. In this paper, we present a new primitive for fuzzy Authentication, called a fuzzy vector signature (FVS) scheme, which significantly alleviates the burden on the user side. This means that the network bandwidth usage (or the amount of storage required on the user side) is significantly reduced. The proposed FVS scheme is reusable and robust to outliers as well. Finally, we provide a privacy-preserving fuzzy Authentication protocol based on the FVS scheme.

Bojan Cukic - One of the best experts on this subject based on the ideXlab platform.

  • Normalizing variations in feature vector structure in keystroke dynamics Authentication systems
    Software Quality Journal, 2016
    Co-Authors: Zahid Syed, Sean Banerjee, Bojan Cukic
    Abstract:

    Usernames and passwords stubbornly remain the most prevalent Authentication mechanism. Password secrecy ensures that only genuine users are granted access. If the secret is breached, impostors gain the access too. One method of strengthening password Authentication is through keystroke dynamics. Keystroke dynamics algorithms typically constrain the Authentication entry to one valid sequence of key presses. In this paper, we introduce the concept of event sequences. We explore the nature of variations between multiple valid key-entry sequences and propose a scheme that effectively represents these variations. We test the efficacy of the new Authentication method in distinguishing users. The experimental results show that typing proficiency of individuals is not the only determining Authentication Factor. We show that typing sequence variations contain sufficient discriminatory information to warrant their inclusion into user Authentication methods. Based on these results, we present a novel strategy to create feature vectors for keystroke dynamics-based Authentication. The proposed approach ensures that the feature vector’s length and structure are related only to the length of the password, independent of its content or the order of keys pressed. This normalization of feature vector structure has multiple advantages including leveraging the discriminatory power of event sequences, faster search-and-retrieval in n -graph-based Authentication systems, and simplicity. The proposed Authentication scheme is applicable to both static and continual Authentication systems.