Academic literature on the topic 'Factor Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Factor Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Factor Authentication"
Putri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.
Full textPapaspirou, Vassilis, Maria Papathanasaki, Leandros Maglaras, et al. "A Novel Authentication Method That Combines Honeytokens and Google Authenticator." Information 14, no. 7 (2023): 386. http://dx.doi.org/10.3390/info14070386.
Full textPranata, Sunderi, Hargyo Tri Nugroho, and Hirofumi Yamaki. "Analisis dan Implementasi Protokol Otentikasi FIDO U2F." Jurnal ULTIMA Computing 9, no. 1 (2017): 30–35. http://dx.doi.org/10.31937/sk.v9i1.571.
Full textSchneier, Bruce. "Two-factor authentication." Communications of the ACM 48, no. 4 (2005): 136. http://dx.doi.org/10.1145/1053291.1053327.
Full textReddy, Anuradha. "B00B-Factor Authentication." Interactions 30, no. 1 (2023): 12–13. http://dx.doi.org/10.1145/3576026.
Full textCarrillo-Torres, Diego, Jesús Arturo Pérez-Díaz, Jose Antonio Cantoral-Ceballos, and Cesar Vargas-Rosales. "A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations." Applied Sciences 13, no. 3 (2023): 1374. http://dx.doi.org/10.3390/app13031374.
Full textRusdan, Muchamad. "Designing of User Authentication Based on Multi-factor Authentication on Wireless Networks." Journal of Advanced Research in Dynamical and Control Systems 12, no. 1 (2020): 201–9. http://dx.doi.org/10.5373/jardcs/v12i1/20201030.
Full textPatel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.
Full textDostálek, L., and J. Šafařík. "MULTI-FACTOR AUTHENTICATION MODELLING." Radio Electronics, Computer Science, Control, no. 2 (September 8, 2020): 106–16. http://dx.doi.org/10.15588/1607-3274-2020-2-11.
Full textRussell, Steve. "Bypassing Multi-Factor Authentication." ITNOW 65, no. 1 (2023): 42–45. http://dx.doi.org/10.1093/combul/bwad023.
Full textDissertations / Theses on the topic "Factor Authentication"
Miranda, Luís Henrique Fernandes Moura. "Context-aware multi-factor authentication." Master's thesis, Faculdade de Ciências e Tecnologia, 2009. http://hdl.handle.net/10362/4111.
Full textTellini, Niklas, and Fredrik Vargas. "Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208097.
Full textFält, Markus. "Multi-factor Authentication : System proposal and analysis of continuous authentication methods." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39212.
Full textGarrett, Keith. "Vulnerabililty Analysis of Multi-Factor Authentication Protocols." UNF Digital Commons, 2016. http://digitalcommons.unf.edu/etd/715.
Full textReese, Kendall Ray. "Evaluating the Usability of Two-Factor Authentication." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6869.
Full textAlnajajr, Adeeb. "Hardware and user profiling for multi-factor authentication." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9030.
Full textChitiprolu, Jyothi. "Three Factor Authentication Using Java Ring and Biometrics." ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/187.
Full textDutson, Jonathan William. "Managing Two-Factor Authentication Setup Through Password Managers." BYU ScholarsArchive, 2020. https://scholarsarchive.byu.edu/etd/8976.
Full textRoy, Graeme Stuart. "Usability engineering for code-based multi-factor authentication." Thesis, University of Edinburgh, 2013. http://hdl.handle.net/1842/11799.
Full textSINIGAGLIA, FEDERICO. "Security Analysis of Multi-Factor Authentication Security Protocols." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1010670.
Full textBooks on the topic "Factor Authentication"
Blokdyk, Gerardus. Multi-factor authentication: Core. CreateSpace Independent Publishing Platform, 2017.
Find full textHill, James, and Ned Zaldivar. Multi-Factor Authentication (MFA) Complete Guide. Pearson Education, Limited, 2022.
Find full textFTX Two-Factor Authentication Number 1808- 582-0813 FTX.US. Oxford University Press, 2012.
Find full textFTX Two-Factor Authentication Number 1808- 582-0813 FTX.US. Oxford University Press, 2001.
Find full textShingala, Manish. Improved Three Factor Remote User Authentication Scheme Using Smart Card. a Review. GRIN Verlag GmbH, 2016.
Find full textBook chapters on the topic "Factor Authentication"
Boonkrong, Sirapat. "Multi-factor Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_6.
Full textMüller, Belinda. "Authentication." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_29.
Full textFietkau, Julian, Syeda Mehak Zahra, and Markus Hartung. "Secure Authentication for Everyone! Enabling 2nd-Factor Authentication Under Real-World Constraints." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_8.
Full textLakshmiraghavan, Badrinarayanan. "Two-Factor Authentication." In Pro ASP.NET Web API Security. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5783-7_14.
Full textDe Soete, Marijke. "Two-Factor Authentication." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_310.
Full textAbu-Nimeh, Saeed. "Three-Factor Authentication." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_793.
Full textCoffin, David. "Two-Factor Authentication." In Expert Oracle and Java Security. Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_9.
Full textCherry, Denny. "Multi-Factor Authentication." In Enterprise-Grade IT Security for Small and Medium Businesses. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8628-9_7.
Full textDasgupta, Dipankar, Arunava Roy, and Abhijit Nag. "Multi-Factor Authentication." In Infosys Science Foundation Series. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58808-7_5.
Full textAbu-Nimeh, Saeed. "Three-Factor Authentication." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_793.
Full textConference papers on the topic "Factor Authentication"
Qureshi, Imran, and Vijay K. Kale. "Multi Factor Authentication System." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687370.
Full textShi, Zhuoxin, Gao Liu, Ning Wang, and Tao Xiang. "Keyboard acoustic-based multiple factor authentication." In Tenth Symposium on Novel Optoelectronic Detection Technology and Applications, edited by Chen Ping. SPIE, 2025. https://doi.org/10.1117/12.3055978.
Full textBrainard, John, Ari Juels, Ronald L. Rivest, Michael Szydlo, and Moti Yung. "Fourth-factor authentication." In the 13th ACM conference. ACM Press, 2006. http://dx.doi.org/10.1145/1180405.1180427.
Full textKennedy, William, and Aspen Olmsted. "Three factor authentication." In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2017. http://dx.doi.org/10.23919/icitst.2017.8356384.
Full textTsymzhitov, Gonchik. "TWO-FACTOR AUTHENTICATION SYSTEM." In 16th International Multidisciplinary Scientific GeoConference SGEM2016. Stef92 Technology, 2016. http://dx.doi.org/10.5593/sgem2016/b21/s07.064.
Full textDostalek, Libor. "Multi-Factor Authentication Modeling." In 2019 9th International Conference on Advanced Computer Information Technologies (ACIT). IEEE, 2019. http://dx.doi.org/10.1109/acitt.2019.8780068.
Full textBezzateev, S., and S. Fomicheva. "Soft Multi-Factor Authentication." In 2020 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). IEEE, 2020. http://dx.doi.org/10.1109/weconf48837.2020.9131537.
Full textBissada, Andrew, and Aspen Olmsted. "Mobile multi-factor authentication." In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2017. http://dx.doi.org/10.23919/icitst.2017.8356383.
Full textGiffin, A., J. D. Skufca, and P. A. Lao. "Using Bayes factors for multi-factor, biometric authentication." In BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING (MAXENT 2014). AIP Publishing LLC, 2015. http://dx.doi.org/10.1063/1.4906029.
Full textHamilton, Cameron, and Aspen Olmstead. "Database multi-factor authentication via pluggable authentication modules." In 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2017. http://dx.doi.org/10.23919/icitst.2017.8356421.
Full textReports on the topic "Factor Authentication"
Galluzzo, Ryan. Implementation Guide for VVSG 2.0: Multi-Factor Authentication. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.vts.400-6.ipd.
Full textSchmitz, Alan. MFAProxy: A reverse proxy for multi-factor authentication. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-1000.
Full textFisher, William. Multi-Factor Authentication for Criminal Justice Information Systems. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8523.
Full textHerrington, Karen, David Walker, Eric Goodman, Jim Jokl, and Scott Cantor. Multi-Factor Authentication (MFA) Interoperability Profile Working Group Final Report. Internet2, 2016. http://dx.doi.org/10.26869/ti.36.1.
Full textNance, Brad. Using Pulse Connect Secure© to Implement Multi-Factor Authentication Solutions. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1550735.
Full textMiller, Jason, Logan Harbour, Robert Carlsen, Andrew Slaughter, Brandon Biggs Jr, and Cody Permann. Standardized Network-Based Deploymentof MOOSE-based Application Binaries with Two-Factor Authentication. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1873380.
Full textNance, Brad, and Adam Bengston. An Integrated Two-Factor Authentication Solution Using Pulse Connect Secure and Apache HTTP Server. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1649375.
Full text