{"id":"https://openalex.org/W2903243156","doi":"https://doi.org/10.1109/icacci.2018.8554377","title":"Highly Secured Architectural Model for Web Based Applications using 2-way Authentication Technique","display_name":"Highly Secured Architectural Model for Web Based Applications using 2-way Authentication Technique","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2903243156","doi":"https://doi.org/10.1109/icacci.2018.8554377","mag":"2903243156"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2018.8554377","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091018342","display_name":"P K Binu","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"P K Binu","raw_affiliation_strings":["Department of Computer Science and Applications, Amrita Vishwa Vidyapeetham, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Applications, Amrita Vishwa Vidyapeetham, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036249590","display_name":"E Induja","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"E Induja","raw_affiliation_strings":["Department of Computer Science and Applications, Amrita Vishwa Vidyapeetham, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Applications, Amrita Vishwa Vidyapeetham, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055143423","display_name":"Monica Earnest","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Monica Earnest","raw_affiliation_strings":["Department of Computer Science and Applications, Amrita Vishwa Vidyapeetham, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Applications, Amrita Vishwa Vidyapeetham, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091018342"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":0.3927,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72864582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"4","issue":null,"first_page":"1006","last_page":"1011"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7762464880943298},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6362255215644836},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.589652419090271},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.58579021692276},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5554060339927673},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5012609958648682},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.41230276226997375},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34514278173446655},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3341643214225769}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7762464880943298},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6362255215644836},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.589652419090271},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.58579021692276},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5554060339927673},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5012609958648682},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.41230276226997375},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34514278173446655},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3341643214225769}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2018.8554377","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1627601386","https://openalex.org/W2019380907","https://openalex.org/W2036044255","https://openalex.org/W2045798328","https://openalex.org/W2074998061","https://openalex.org/W2185973617","https://openalex.org/W2334526175","https://openalex.org/W2411182535","https://openalex.org/W2612763599","https://openalex.org/W2724381582","https://openalex.org/W2774585501","https://openalex.org/W2784017372","https://openalex.org/W4248234013","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2360010141","https://openalex.org/W2093798919","https://openalex.org/W2134444393","https://openalex.org/W2107692711","https://openalex.org/W3096443715","https://openalex.org/W2034419863","https://openalex.org/W2132505069","https://openalex.org/W2296396257","https://openalex.org/W2054202867","https://openalex.org/W3007106793"],"abstract_inverted_index":{"In":[0],"this":[1],"age":[2],"of":[3],"Big":[4],"Data,":[5],"the":[6,13,35,39,60,70,109,122],"data":[7,110],"is":[8,53,118],"broadly":[9],"distributed":[10],"all":[11],"through":[12],"web":[14,103],"which":[15,117],"can":[16,32],"be":[17],"utilized":[18],"for":[19],"criminal":[20,23],"and":[21,72,95,112],"non":[22],"exercises.":[24],"A":[25],"third":[26],"party":[27],"with":[28],"a":[29,78,88],"proper":[30],"tool":[31],"sniff":[33],"into":[34],"communication":[36,115],"process":[37,116],"between":[38,93],"legitimate":[40],"users.":[41],"With":[42],"remarkable":[43],"development":[44],"in":[45,59,68,102,121],"computer":[46],"technology":[47],"nowadays,":[48],"1-way":[49,83],"authentication":[50,76,92],"(e.g.":[51],"passwords)":[52],"no":[54],"more":[55],"analyzed":[56],"as":[57],"secure":[58],"Internet.":[61],"It":[62],"has":[63],"never":[64],"been":[65],"less":[66],"troublesome":[67],"protecting":[69],"system":[71,107],"remote":[73],"access.":[74],"2-way":[75,91],"guarantees":[77],"higher":[79],"security":[80],"level":[81],"than":[82],"authentication.":[84],"This":[85],"paper":[86],"proposes":[87],"highly":[89],"secured":[90],"client":[94],"server":[96],"using":[97],"Zero":[98],"Knowledge":[99],"Protocol":[100],"(ZKP)":[101],"applications.":[104],"Additionally,":[105],"our":[106],"ensures":[108],"confidentiality":[111],"integrity":[113],"during":[114],"very":[119],"relevant":[120],"present":[123],"day":[124],"scenario.":[125]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
