•  Home
  • Library
  • DRO home
Submit research Contact DRO

DRO

Robust multi-factor authentication for fragile communications

Huang,X, Xiang,Y, Bertino,E, Zhou,J and Xu,L 2014, Robust multi-factor authentication for fragile communications, IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 6, pp. 568-581, doi: 10.1109/TDSC.2013.2297110.

Attached Files
Name Description MIMEType Size Downloads

Title Robust multi-factor authentication for fragile communications
Author(s) Huang,X
Xiang,YORCID iD for Xiang,Y orcid.org/0000-0001-5252-0831
Bertino,E
Zhou,J
Xu,L
Journal name IEEE Transactions on Dependable and Secure Computing
Volume number 11
Issue number 6
Start page 568
End page 581
Total pages 14
Publisher Institute of Electrical and Electronics Engineers Inc
Place of publication Piscataway, N. J
Publication date 2014-11-01
ISSN 1545-5971
Keyword(s) Authentication
efficiency
multi-factor
privacy
stand-alone
Science & Technology
Technology
Computer Science, Hardware & Architecture
Computer Science, Information Systems
Computer Science, Software Engineering
Computer Science
ENCRYPTION
SECURE
BIOMETRICS
Summary In large-scale systems, user authentication usually needs the assistance from a remote central authentication server via networks. The authentication service however could be slow or unavailable due to natural disasters or various cyber attacks on communication channels. This has raised serious concerns in systems which need robust authentication in emergency situations. The contribution of this paper is two-fold. In a slow connection situation, we present a secure generic multi-factor authentication protocol to speed up the whole authentication process. Compared with another generic protocol in the literature, the new proposal provides the same function with significant improvements in computation and communication. Another authentication mechanism, which we name stand-alone authentication, can authenticate users when the connection to the central server is down. We investigate several issues in stand-alone authentication and show how to add it on multi-factor authentication protocols in an efficient and generic way.
Language eng
DOI 10.1109/TDSC.2013.2297110
Field of Research 080303 Computer System Security
Socio Economic Objective 890202 Application Tools and System Utilities
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2014, Institute of Electrical and Electronics Engineers Inc
Persistent URL http://hdl.handle.net/10536/DRO/DU:30072049

Document type: Journal Article
Collections: Faculty of Science, Engineering and Built Environment
School of Information Technology
2018 ERA Submission
Related Links
Link Description
Connect to published version
Go to link with your DU access privileges
 
Connect to Elements publication management system
Go to link with your DU access privileges
 
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 82 times in TR Web of Science
Scopus Citation Count Cited 100 times in Scopus Google Scholar Search Google Scholar
Access Statistics: 680 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Thu, 02 Apr 2015, 16:16:45 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.