Academic literature on the topic 'Factor Authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Factor Authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Factor Authentication"

1

Putri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.

Full text
Abstract:
Authentication is a method for securing an account by verifying the user identity by inputting email with a password. Two factor authentications is an authentication system that combines the first-factor authentication with the second factor. General two factor authentication by entering an email or username with a password are similar. However, two factor authentication requires additional information that must be inputted by the user. Additional information can be in the form of tokens or one-time passwords (OTP). Two factor authentications generally still uses third-party services to genera
APA, Harvard, Vancouver, ISO, and other styles
2

Papaspirou, Vassilis, Maria Papathanasaki, Leandros Maglaras, et al. "A Novel Authentication Method That Combines Honeytokens and Google Authenticator." Information 14, no. 7 (2023): 386. http://dx.doi.org/10.3390/info14070386.

Full text
Abstract:
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. To address this, this study proposes a new two-factor authentication method that uses honeytokens. Honeytokens and Google Authenticator are combined to create a stronger authentication process. The proposed approach aims to provide additional layers of security and protection to computer systems, increasing their overall security beyond what is
APA, Harvard, Vancouver, ISO, and other styles
3

Pranata, Sunderi, Hargyo Tri Nugroho, and Hirofumi Yamaki. "Analisis dan Implementasi Protokol Otentikasi FIDO U2F." Jurnal ULTIMA Computing 9, no. 1 (2017): 30–35. http://dx.doi.org/10.31937/sk.v9i1.571.

Full text
Abstract:
It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device
APA, Harvard, Vancouver, ISO, and other styles
4

Schneier, Bruce. "Two-factor authentication." Communications of the ACM 48, no. 4 (2005): 136. http://dx.doi.org/10.1145/1053291.1053327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reddy, Anuradha. "B00B-Factor Authentication." Interactions 30, no. 1 (2023): 12–13. http://dx.doi.org/10.1145/3576026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Carrillo-Torres, Diego, Jesús Arturo Pérez-Díaz, Jose Antonio Cantoral-Ceballos, and Cesar Vargas-Rosales. "A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations." Applied Sciences 13, no. 3 (2023): 1374. http://dx.doi.org/10.3390/app13031374.

Full text
Abstract:
Conventional authentication methods, like simple text-based passwords, have shown vulnerabilities to different types of security attacks. Indeed, 61% of all breaches involve credentials, whether stolen via social engineering or hacked using brute force. Therefore, a robust user authentication mechanism is crucial to have secure systems. Combining textual passwords with graphical passwords in a multi-factor approach can be an effective strategy. Advanced authentication systems, such as biometrics, are secure, but require additional infrastructure for efficient implementation. This paper propose
APA, Harvard, Vancouver, ISO, and other styles
7

Rusdan, Muchamad. "Designing of User Authentication Based on Multi-factor Authentication on Wireless Networks." Journal of Advanced Research in Dynamical and Control Systems 12, no. 1 (2020): 201–9. http://dx.doi.org/10.5373/jardcs/v12i1/20201030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Patel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.

Full text
Abstract:
The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authenticatio
APA, Harvard, Vancouver, ISO, and other styles
9

Dostálek, L., and J. Šafařík. "MULTI-FACTOR AUTHENTICATION MODELLING." Radio Electronics, Computer Science, Control, no. 2 (September 8, 2020): 106–16. http://dx.doi.org/10.15588/1607-3274-2020-2-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Russell, Steve. "Bypassing Multi-Factor Authentication." ITNOW 65, no. 1 (2023): 42–45. http://dx.doi.org/10.1093/combul/bwad023.

Full text
Abstract:
Abstract Increased adoption of multi–factor authentication (MFA) is helping companies and individuals to secure their data more effectively; however, threat actors have been quick to adapt in the constantly evolving security arms race. Steve Russell MBCS CITP CISSP explores the rising trend in MFA bypass techniques, and how to mitigate against them.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Factor Authentication"

1

Miranda, Luís Henrique Fernandes Moura. "Context-aware multi-factor authentication." Master's thesis, Faculdade de Ciências e Tecnologia, 2009. http://hdl.handle.net/10362/4111.

Full text
Abstract:
Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial para obtenção do grau de Mestre em Engenharia Informática<br>Authentication systems, as available today, are inappropriate for the requirements of ubiquitous, heterogeneous and large scale distributed systems. Some important limitations are: (i) the use of weak or rigid authentication factors as principal’s identity proofs, (ii) non flexibility to combine different authentication modes for dynamic and context-aware interaction criteria, (iii) not being extensible models to integrate new or emergent
APA, Harvard, Vancouver, ISO, and other styles
2

Tellini, Niklas, and Fredrik Vargas. "Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208097.

Full text
Abstract:
Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. In this project, we analyze different methods in which 2FA could be implemented by a Digital Assessment Platform. These platforms allow tes
APA, Harvard, Vancouver, ISO, and other styles
3

Fält, Markus. "Multi-factor Authentication : System proposal and analysis of continuous authentication methods." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39212.

Full text
Abstract:
It is common knowledge that the average user has multiple online accounts which all require a password. Some studies have shown that the number password for the average user is around 25. Considering this, one can see that it is unreasonable to expect the average user to have 25 truly unique passwords. Because of this multi-factor authentication could potentially be used to reduce the number of passwords to remember while maintaining and possibly exceeding the security of unique passwords. This thesis therefore, aims to examine continuous authentication methods as well as proposing an authenti
APA, Harvard, Vancouver, ISO, and other styles
4

Garrett, Keith. "Vulnerabililty Analysis of Multi-Factor Authentication Protocols." UNF Digital Commons, 2016. http://digitalcommons.unf.edu/etd/715.

Full text
Abstract:
In this thesis, the author hypothesizes that the use of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerabilities in those protocols. In order to test this hypothesis: 1. A generalized algorithm for cryptanalysis was formulated to perform a clogging attack (a formof denial of service) on protocols that use computationally intensive modular exponentiation to guarantee security. 2. This technique was then applied to cryptanalyze four recent password authentication protocols, to determine their susceptibility to the clogging attack
APA, Harvard, Vancouver, ISO, and other styles
5

Reese, Kendall Ray. "Evaluating the Usability of Two-Factor Authentication." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6869.

Full text
Abstract:
Passwords are the dominant form of authentication on the web today. However,many users choose weak passwords and reuse the same password on multiple sites, thus increasing their vulnerability to having their credentials leaked or stolen. Two-factor authentication strengthens existing password authentication schemes against impersonation attacks and makes it more difficult for attackers to reuse stolen credentials on other websites. Despite the added security benefits of two-factor authentication, there are still many open questions about its usability. Many two-factor authentication systems in
APA, Harvard, Vancouver, ISO, and other styles
6

Alnajajr, Adeeb. "Hardware and user profiling for multi-factor authentication." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9030.

Full text
Abstract:
Most software applications rely on the use of user-name and passwords to authenticate end users. This form of authentication, although used ubiquitously, is widely considered unreliable due to the users inability to keep them secret; passwords being prone to dictionary or rainbow-table attacks; as well as the ease with which social engineering techniques can obtain passwords. This can be mitigated by combining a variety of diferent authentication mechanisms, for example biometric authentication such as fingerprint recognition or physical tokens such as smart cards. The resulting multifactor au
APA, Harvard, Vancouver, ISO, and other styles
7

Chitiprolu, Jyothi. "Three Factor Authentication Using Java Ring and Biometrics." ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/187.

Full text
Abstract:
Computer security is a growing field in the IT industry. One of the important aspects of the computer security is authentication. Using passwords (something you know) is one of the most common ways of authentications. But passwords have proven to provide weak level of security as they can be easily compromised. Some other ways of authenticating a user are using physical tokens, (something you possess) and biometrics, (something you are). Using any one of these techniques to secure a system always has its own set of threats. One way to make sure a system is secure is to use multiple fact
APA, Harvard, Vancouver, ISO, and other styles
8

Dutson, Jonathan William. "Managing Two-Factor Authentication Setup Through Password Managers." BYU ScholarsArchive, 2020. https://scholarsarchive.byu.edu/etd/8976.

Full text
Abstract:
Two-factor authentication (2FA) provides online accounts with protection against remote account compromise. Despite the security benefits, adoption of 2FA has remained low, in part due to poor usability. We explore the possibility of improving the usability of the 2FA setup process by providing setup automation through password managers. We create a proof-of-concept KeePass (a popular password manager) extension that adds browser-based automation to the 2FA setup process and conduct a 30-participant within-subjects user study to measure user perceptions about the system. Our system is found to
APA, Harvard, Vancouver, ISO, and other styles
9

Roy, Graeme Stuart. "Usability engineering for code-based multi-factor authentication." Thesis, University of Edinburgh, 2013. http://hdl.handle.net/1842/11799.

Full text
Abstract:
The increase in the use of online banking and other alternative banking channels has led to improved flexibility for customers but also an increase in the amount of fraud across these channels. The industry recommendation for banks and other financial institutions is to use multi-factor customer authentication to reduce the risk of identity theft and fraud for those choosing to use such banking channels. There are few multi-factor authentication solutions available for banks to use that offer a convenient security procedure across all banking channels. The CodeSure card presented in this resea
APA, Harvard, Vancouver, ISO, and other styles
10

SINIGAGLIA, FEDERICO. "Security Analysis of Multi-Factor Authentication Security Protocols." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1010670.

Full text
Abstract:
Multi-Factor Authentication (MFA) is being increasingly adopted by on- line services in order to achieve an adequate level of security. MFA is based on security protocols, called MFA protocols, that integrate the use of credentials with additional identity proofs, called authentication factors (based on knowledge, possession or inherence). The authentication factors are provided through specific objects, called authenticators (e.g., hardware token). To date, MFA has been widely adopted in the most diverse security-critical application scenarios (e.g., online banking, eHealth). Various solution
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Factor Authentication"

1

Stanislav, Mark. Two-Factor Authentication. de Gruyter GmbH, Walter, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Publishing, IT Governance. Two-Factor Authentication. IT Governance Ltd, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stanislav, Mark. Two-Factor Authentication. de Gruyter GmbH, Walter, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Blokdyk, Gerardus. Multi-factor authentication: Core. CreateSpace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hill, James, and Ned Zaldivar. Multi-Factor Authentication (MFA) Complete Guide. Pearson Education, Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

FTX Two-Factor Authentication Number 1808- 582-0813 FTX.US. Oxford University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

FTX Two-Factor Authentication Number 1808- 493-1704 FTX.US. Penguin, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

FTX Two-Factor Authentication Number 1808- 493-1704 FTX.US. W.W. Norton, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

FTX Two-Factor Authentication Number 1808- 582-0813 FTX.US. Oxford University Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shingala, Manish. Improved Three Factor Remote User Authentication Scheme Using Smart Card. a Review. GRIN Verlag GmbH, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Factor Authentication"

1

Boonkrong, Sirapat. "Multi-factor Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Müller, Belinda. "Authentication." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_29.

Full text
Abstract:
AbstractAn authentication process is a process of verifying an entity’s identity based on one or multiple factors. A factor can be something the entity is, possesses, or knows. Depending on the number of credentials (or factors) required, the authentication process is referred to as single-factor authentication, two-factor authentication, or multifactor authentication. In choosing a particular authentication solution for organizations, it is crucial to balance security, usability, cost, and privacy considerations. The authentication solution for a particular service can be predetermined for th
APA, Harvard, Vancouver, ISO, and other styles
3

Fietkau, Julian, Syeda Mehak Zahra, and Markus Hartung. "Secure Authentication for Everyone! Enabling 2nd-Factor Authentication Under Real-World Constraints." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_8.

Full text
Abstract:
AbstractMillions of user accounts have been exposed by data breaches within the last years. The leaked credentials pose a huge threat to many because they can be used for credential stuffing and brute-force attacks across all online services. The best solution for this problem seems to be the use of 2nd-factor authentication, like hardware tokens or one-time passwords. While these are great solutions, they cause many problems for users because they are too expensive, difficult to manage, or just not user-friendly. In this paper, we will present the results of a study that shows that users need
APA, Harvard, Vancouver, ISO, and other styles
4

Lakshmiraghavan, Badrinarayanan. "Two-Factor Authentication." In Pro ASP.NET Web API Security. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5783-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

De Soete, Marijke. "Two-Factor Authentication." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abu-Nimeh, Saeed. "Three-Factor Authentication." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Coffin, David. "Two-Factor Authentication." In Expert Oracle and Java Security. Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cherry, Denny. "Multi-Factor Authentication." In Enterprise-Grade IT Security for Small and Medium Businesses. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8628-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dasgupta, Dipankar, Arunava Roy, and Abhijit Nag. "Multi-Factor Authentication." In Infosys Science Foundation Series. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58808-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abu-Nimeh, Saeed. "Three-Factor Authentication." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_793.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Factor Authentication"

1

Qureshi, Imran, and Vijay K. Kale. "Multi Factor Authentication System." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shi, Zhuoxin, Gao Liu, Ning Wang, and Tao Xiang. "Keyboard acoustic-based multiple factor authentication." In Tenth Symposium on Novel Optoelectronic Detection Technology and Applications, edited by Chen Ping. SPIE, 2025. https://doi.org/10.1117/12.3055978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brainard, John, Ari Juels, Ronald L. Rivest, Michael Szydlo, and Moti Yung. "Fourth-factor authentication." In the 13th ACM conference. ACM Press, 2006. http://dx.doi.org/10.1145/1180405.1180427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kennedy, William, and Aspen Olmsted. "Three factor authentication." In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2017. http://dx.doi.org/10.23919/icitst.2017.8356384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tsymzhitov, Gonchik. "TWO-FACTOR AUTHENTICATION SYSTEM." In 16th International Multidisciplinary Scientific GeoConference SGEM2016. Stef92 Technology, 2016. http://dx.doi.org/10.5593/sgem2016/b21/s07.064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dostalek, Libor. "Multi-Factor Authentication Modeling." In 2019 9th International Conference on Advanced Computer Information Technologies (ACIT). IEEE, 2019. http://dx.doi.org/10.1109/acitt.2019.8780068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bezzateev, S., and S. Fomicheva. "Soft Multi-Factor Authentication." In 2020 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). IEEE, 2020. http://dx.doi.org/10.1109/weconf48837.2020.9131537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bissada, Andrew, and Aspen Olmsted. "Mobile multi-factor authentication." In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2017. http://dx.doi.org/10.23919/icitst.2017.8356383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Giffin, A., J. D. Skufca, and P. A. Lao. "Using Bayes factors for multi-factor, biometric authentication." In BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING (MAXENT 2014). AIP Publishing LLC, 2015. http://dx.doi.org/10.1063/1.4906029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hamilton, Cameron, and Aspen Olmstead. "Database multi-factor authentication via pluggable authentication modules." In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2017. http://dx.doi.org/10.23919/icitst.2017.8356421.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Factor Authentication"

1

Galluzzo, Ryan. Implementation Guide for VVSG 2.0: Multi-Factor Authentication. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.vts.400-6.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schmitz, Alan. MFAProxy: A reverse proxy for multi-factor authentication. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-1000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fisher, William. Multi-Factor Authentication for Criminal Justice Information Systems. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Herrington, Karen, David Walker, Eric Goodman, Jim Jokl, and Scott Cantor. Multi-Factor Authentication (MFA) Interoperability Profile Working Group Final Report. Internet2, 2016. http://dx.doi.org/10.26869/ti.36.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nance, Brad. Using Pulse Connect Secure© to Implement Multi-Factor Authentication Solutions. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1550735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miller, Jason, Logan Harbour, Robert Carlsen, Andrew Slaughter, Brandon Biggs Jr, and Cody Permann. Standardized Network-Based Deploymentof MOOSE-based Application Binaries with Two-Factor Authentication. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1873380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nance, Brad, and Adam Bengston. An Integrated Two-Factor Authentication Solution Using Pulse Connect Secure and Apache HTTP Server. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1649375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!