Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,890,181 papers from all fields of science
Search
Sign In
Create Free Account
HMAC-based One-time Password Algorithm
Known as:
HOTP
, Hash-Based One-time Password Algorithm
HOTP is an HMAC-based one-time password (OTP) algorithm. It is a cornerstone of Initiative For Open Authentication (OATH). HOTP was published as an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Android
BlackBerry
Chrome OS
Google Authenticator
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Scalable authentication for integration server
Zdenek Martinasek
,
L. Malina
,
V. Zeman
International Conference on Telecommunications…
2015
Corpus ID: 334459
The paper deals with the scalable authentication schemes for a integration server. The integration server is essentially a cloud…
Expand
2015
2015
STUDI LITERATUR : PERBANDINGAN KEAMANAN PADA ALGORITMA TIME-BASED ONE TIME PASSWORD (TOTP) DENGAN HMAC-BASED ONE TIME PASSWORD (HOTP)
Willy Sudiarto Raharjo
,
N. Haryono
2015
Corpus ID: 61624318
2014
2014
ANALYTICAL APPROACH OF COST-EFFECTIVE AND SECURE SIP-BASED MOBILITY MANAGEMENT SCHEME FOR NEMO ENVIRONMENTS
Chulhee Cho
,
Jun-Dong Cho Jongpil Jeong Jae-Young Choi
2014
Corpus ID: 18889441
The mobile Virtual Private Network (MVPN) of the Internet Engineering Task Force (IETF) is not designed to support NEtwork…
Expand
2012
2012
Internet Banking Two-Factor Authentication using Smartphones
C. A. Soare
2012
Corpus ID: 55802932
This paper describes a method of implementing two-factor authentication using smart phones as software tokens. The proposed…
Expand
2012
2012
HOTP-Based Key Agreement Protocol Over Home Network
Hyunsung Kim
,
Hyunjee Kim
2012
Corpus ID: 53839447
Recently, Interest usage in home network is increasing rapidly with the rapid growth of Internet users and wireless devices. For…
Expand
2012
2012
MAVE, NEW LIGHTWEIGHT DIGITAL SIGNATURE PROTOCOLS FOR MASSIVE VERIFICATIONS
Sergio Demián
2012
Corpus ID: 42293000
In this paper we propose new decentralized digital signature protocols to allow massive bulk verifications (MAVE). The protocols…
Expand
2011
2011
Using the HMAC-Based One-Time Password Algorithm for TLS Authentication
Balkis Hamdane
,
A. Serhrouchni
,
Adrien Montfaucon
,
Sihem Guemara
Conference on Network and Information Systems…
2011
Corpus ID: 17890623
Transport Layer Security (TLS) constitutes the main protocol used to secure the exchanges in the Internet. Indeed, this protocol…
Expand
2011
2011
OCRA: OATH Challenge-Response Algorithm
David M'Raïhi
,
Johan Rydell
,
S. Bajaj
,
S. Machani
,
D. Naccache
Request for Comments
2011
Corpus ID: 28615994
This document describes the OATH algorithm for challenge-response authentication and signatures. This algorithm is based on the…
Expand
2011
2011
Low‐Power Design of Hardware One‐Time Password Generators for Card‐Type OTPs
Sung‐Jae Lee
,
Jae Seong Lee
,
Mun-Kyu Lee
,
Sang Jin Lee
,
Doo Ho Choi
,
Dong Kyue Kim
2011
Corpus ID: 59941347
Since card‐type one‐time password (OTP) generators became available, power and area consumption has been one of the main issues…
Expand
2009
2009
SIP authentication based on HOTP
Thomas Guillet
,
R. Moalla
,
A. Serhrouchni
,
A. Obaid
International Conference on Information…
2009
Corpus ID: 15350611
Current authentications with a secret key are based on the Challenge-Response paradigm. This mechanism avoids the clear…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required