CHAPTER 7
References
[1] R. Morris and K. Thompson, “Password security: a case history,” Communications of theACM, vol. 22, no. 11, pp. 594–597, Jan. 1979.
[2] J. Bonneau, C. Herley, P. C. v. Oorschot and F. Stajano, "The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes," 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, 2012, pp. 553-567.
[3] “2017 Annual Cybersecurity Threat Report | eSentire,” eSentire Managed Detection and Response.
[Online]. Available: https://www.esentire.com/resources/knowledge/2017-annual-threatreport. [Accessed:
26-Sep-2019].
[4] “Yahoo 2013 data breach hit ’all three billion accounts’,” BBC News, 03-Oct-2017. [Online]. Available:
https://www.bbc.com/news/business-41493494. [Accessed: 01- Sep-2022].
[5] “Uber Data Breach Exposed Personal Information of 20 Million Users,” Fortune. [Online]. Available:
http://fortune.com/2018/04/12/uber-data-breach-security/. [Accessed: 25-Sep-2022].
[6] Google 2-Step Verification. [Online]. Available: https://www.google.com/landing/2step/. [Accessed: 5- Jan-2022.]
[7] “U2F - FIDO Universal 2nd Factor Authentication,” Yubico. [Online]. Available:
https://www.yubico.com/solutions/fido-u2f. [Accessed: 14Sep-2022].
[8] S. Sahute, S. Waghamare, and A. Diwate, “Secure Messaging Using Image Stegnography”, International Journal of Modern Trends in Engineering and Research,vol.2,no.3, pp. 598–608, 2015.
[9] J. Baek, C. Kim, P. S. Fisher, and H. Chao, “(N, 1) secret sharing approach based on steganography with gray digital images,” 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010.
[10] R.-Z. Wang, C.-F. Lin, and J.-C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,”
Pattern Recognition, vol. 34, no. 3, pp. 671–683, 2001.
[11] A. K. Das, “A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks,”Wireless Personal Communications, vol. 82, no. 3, pp. 1377–1404, 2015.
[12] M. N. Babu, A. S. N. Chakravarthy, and C. Ravindranath, “The design of a secure three factor authentication protocol for wireless sensor networks,” 2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2), 2017.
[13] J. Shen, D. Liu, S. Chang, J. Shen, and D. He, “A Lightweight Mutual Authentication Scheme for User and Server in Cloud,” 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA), 2015.
[14] J. H. Yang and P. Y. Lin, “An ID-Based User Authentication Scheme for Cloud Computing,” 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
[16] M. L. Das, A. Saxena and V. P. Gulati, "A dynamic ID-based remote user authentication scheme," in IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629-631, May 2004.
[17] Liu,Wenhao, “An improved authenticated key agreement protocol for telecare medicine information system” SpringerPlus vol. 5 555, 2016.
[18] C. Huang and J. Li, "One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem forUMTS," 21st International Conference on Advanced Information Networking and Applications (AINA ’07), Niagara Falls, ON, 2007, pp. 482-489.
[19] J.-K. Tsay and S. F. Mjølsnes, “A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols,” Lecture Notes in Computer Science Computer Network Security, pp. 65– 76, 2012.
[20] A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and H. Jae-Lee, “A Strong User Authentication Framework for Cloud Computing,” 2011 IEEE Asia-Pacific Services Computing Conference, 2011.
[21] M. Kumar, “New remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 597–600, 2004.
[22] K. A. Varmedal, H. Klevjer, J. Hovlandsvåg, A. Jøsang, J. Vincent, and L. Miralabé, “The OffPAD:
Requirements and Usage,” Network and System Security Lecture Notes in Computer Science, pp. 80–93, 2013.
[23] M. Alhaidary, S. M. M. Rahman, M. Zakariah, M. S. Hossain, A. Alamri, M. S. M. Haque, and B. B.
Gupta, “Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol,” IEEE Access, vol. 6, pp. 6071– 6081, 2018.
[24] M. Alhaidary and S. M. Rahman, “Security vulnerability analysis and corresponding mitigation for password-based authentication using an offline personal authentication device,” 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016.
[25] W. A. Hufstetler, M. J. H. Ramos, and S. Wang, “NFC Unlock: Secure Two-Factor Computer Authentication Using NFC,” 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2017.
[26] W. Mao, Modern cryptography: theory and practice. Upper Saddle River, N.J: Prentice Hall, 2011. [27]
Liu,Wenhao, "An improved authenticated key agreement protocol for telecare medicine information system."
SpringerPlus, 5.1, 2016:
[28] B. Madhuravani, P. B. Reddy, D. S. R. Murthy, and K. V. S. N. Rama Rao, “Strong authentication using dynamic hashing and steganography,” International Conference on Computing, Communication Au- omation, 2015.
[29] S.-H. Gunawardena, D. Kulkarni, and B. Gnanasekaraiyer, “A Steganography-based framework to prevent active attacks during user authentication,” 2013 8th International Conference on Computer Science Education, 2013.
[30] S. Roy and P. Venkateswaran, "Online payment system using steganography and visual cryptography,"
2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science, Bhopal, 2014, pp. 1-5.
[31] H.-D. Ihmaidi, A. Al-Jaber, and A. Hudaib, “Securing Online Shopping using Biometric Personal Authentication and Steganography,” 2006 2nd International Conference on Information Communication Technologies.
[32] T. Mantoro, D. D. Permadi, and A. Abubakar, “Stegano-image as a digital signature to improve security authentication system in mobile computing,” 2016 International Conference on Informatics and Computing (ICIC), 2016.
[33] C. Danuputri, T. Mantoro, and M. Hardjianto, “Data Security Using LSB Steganography and Vigenere Chiper in an Android Environment,” 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), 2015.
[34] Min-Shiang Hwang and Li-Hua Li, "A new remote user authentication scheme using smart cards," in IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, Feb. 2000.
[35] H. Jung and H. S. Kim, “Secure Hash-Based Password Authentication Protocol Using Smartcards,”
Computational Science and Its Applications - ICCSA2011 LectureNotes in Computer Science, pp. 593–606, 2011.
[36] A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and H. Jae-Lee, “A Strong User Authentication Framework for Cloud Computing,” 2011 IEEE Asia-Pacific Services Computing Conference, 2011.
[37] A. M. Eskicioglu and P. S. Fisher, "Image quality measures and their performance," in IEEE Transactions on Communications, vol. 43, no. 12, pp. 2959-2965, Dec. 1995.
[38] Zhizhong Zhe and Hong Ren Wu, "A new way of pooling: starting from an image quality measure,"
Proceedings 7th International Conference on Signal Processing, 2004.