Have a personal or library account? Click to login
Extended Authentication Based on Geometric Patterns and Transformations Cover

Extended Authentication Based on Geometric Patterns and Transformations

Open Access
|Nov 2024

Abstract

Authentication by key is successfully applied in many cases. However, this simple approach raises several problems during contextual authentication, when the final decision depends not only on the knowledge of the key but also on some other independent parameters such as time, distance, values fetched from nearby internet of things (IoT) devices, etc. Such contextual parameters are usually considered an independent phase of the whole authentication process. In this paper, we propose a new method of extended authentication because, instead of using just keys, we also applied some mathematical formulas describing the context to be evaluated as a single cryptographic process.

Language: English
Submitted on: Mar 2, 2022
Published on: Nov 26, 2024
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2024 Tomasz Krokosz, Jarogniew Rykowski, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.