Password authentication without using a password table
Information Processing Letters
A Unified and Generalized Treatment of Authentification Theory
STACS '96 Proceedings of the 13th Annual Symposium on Theoretical Aspects of Computer Science
Universal Hashing and Authentication Codes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Authentication theory and hypothesis testing
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Identity authentication systems and procedures are rapidly becoming one of the central issues in the practice and study of information systems development and security. Requirements for Web Transaction Security (WTS) include strong authentication of user, non-repudiation and encryption of all traffic. In this paper, we present an effective mechanism involving two different channels, which addresses the prime concerns involved in the security of the Electronic Commerce Transactions (ECT) viz. the user authentication and the non-repudiation. Although the product is primarily targeted to provide a fillip to the transaction carried out over the web, this product can also be effectively used for transactions that are carried out other than Internet where user authentication is required.