To see the other types of publications on this topic, follow the link: Factor Authentication.

Journal articles on the topic 'Factor Authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Factor Authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Putri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.

Full text
Abstract:
Authentication is a method for securing an account by verifying the user identity by inputting email with a password. Two factor authentications is an authentication system that combines the first-factor authentication with the second factor. General two factor authentication by entering an email or username with a password are similar. However, two factor authentication requires additional information that must be inputted by the user. Additional information can be in the form of tokens or one-time passwords (OTP). Two factor authentications generally still uses third-party services to genera
APA, Harvard, Vancouver, ISO, and other styles
2

Papaspirou, Vassilis, Maria Papathanasaki, Leandros Maglaras, et al. "A Novel Authentication Method That Combines Honeytokens and Google Authenticator." Information 14, no. 7 (2023): 386. http://dx.doi.org/10.3390/info14070386.

Full text
Abstract:
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. To address this, this study proposes a new two-factor authentication method that uses honeytokens. Honeytokens and Google Authenticator are combined to create a stronger authentication process. The proposed approach aims to provide additional layers of security and protection to computer systems, increasing their overall security beyond what is
APA, Harvard, Vancouver, ISO, and other styles
3

Pranata, Sunderi, Hargyo Tri Nugroho, and Hirofumi Yamaki. "Analisis dan Implementasi Protokol Otentikasi FIDO U2F." Jurnal ULTIMA Computing 9, no. 1 (2017): 30–35. http://dx.doi.org/10.31937/sk.v9i1.571.

Full text
Abstract:
It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device
APA, Harvard, Vancouver, ISO, and other styles
4

Schneier, Bruce. "Two-factor authentication." Communications of the ACM 48, no. 4 (2005): 136. http://dx.doi.org/10.1145/1053291.1053327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reddy, Anuradha. "B00B-Factor Authentication." Interactions 30, no. 1 (2023): 12–13. http://dx.doi.org/10.1145/3576026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Carrillo-Torres, Diego, Jesús Arturo Pérez-Díaz, Jose Antonio Cantoral-Ceballos, and Cesar Vargas-Rosales. "A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations." Applied Sciences 13, no. 3 (2023): 1374. http://dx.doi.org/10.3390/app13031374.

Full text
Abstract:
Conventional authentication methods, like simple text-based passwords, have shown vulnerabilities to different types of security attacks. Indeed, 61% of all breaches involve credentials, whether stolen via social engineering or hacked using brute force. Therefore, a robust user authentication mechanism is crucial to have secure systems. Combining textual passwords with graphical passwords in a multi-factor approach can be an effective strategy. Advanced authentication systems, such as biometrics, are secure, but require additional infrastructure for efficient implementation. This paper propose
APA, Harvard, Vancouver, ISO, and other styles
7

Rusdan, Muchamad. "Designing of User Authentication Based on Multi-factor Authentication on Wireless Networks." Journal of Advanced Research in Dynamical and Control Systems 12, no. 1 (2020): 201–9. http://dx.doi.org/10.5373/jardcs/v12i1/20201030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Patel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.

Full text
Abstract:
The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authenticatio
APA, Harvard, Vancouver, ISO, and other styles
9

Dostálek, L., and J. Šafařík. "MULTI-FACTOR AUTHENTICATION MODELLING." Radio Electronics, Computer Science, Control, no. 2 (September 8, 2020): 106–16. http://dx.doi.org/10.15588/1607-3274-2020-2-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Russell, Steve. "Bypassing Multi-Factor Authentication." ITNOW 65, no. 1 (2023): 42–45. http://dx.doi.org/10.1093/combul/bwad023.

Full text
Abstract:
Abstract Increased adoption of multi–factor authentication (MFA) is helping companies and individuals to secure their data more effectively; however, threat actors have been quick to adapt in the constantly evolving security arms race. Steve Russell MBCS CITP CISSP explores the rising trend in MFA bypass techniques, and how to mitigate against them.
APA, Harvard, Vancouver, ISO, and other styles
11

Matsui, Masahiro, Hiroaki Ohtsuka, Tetsutaro Kobayashi, Hironobu Okuyama, Akira Nagai, and Go Yamamoto. "Milagro Multi-Factor Authentication." NTT Technical Review 14, no. 12 (2016): 55–61. http://dx.doi.org/10.53829/ntr201612ra1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Shinde1, Aditya S. "Multi-Factor Authentication: A Comprehensive Review." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50831.

Full text
Abstract:
Multi-factor authentication (MFA) has become a fundamental security measure in modern information systems, significantly reducing the risk of unauthorized access. This paper reviews current literature, standards, and best practices to evaluate the effectiveness, implementation challenges, and future directions of MFA. MFA works by requiring two or more distinct credentials—such as knowledge (passwords), possession (tokens), or inherence (biometrics)—making it far more resilient than single-factor methods. Despite its security benefits, MFA introduces usability challenges, additional costs, and
APA, Harvard, Vancouver, ISO, and other styles
13

RAMA, YERRAMILLI, and NIRMALA KUMAR SWAMY DR. "A COMPARATIVE STUDY OF TRADITIONAL AUTHENTICATION AND AUTHORIZATION METHODS WITH BLOCK CHAIN TECHNOLOGY FOR E GOVERNANCE SERVICES." JournalNX - A Multidisciplinary Peer Reviewed Journal ICACTM (May 4, 2018): 149–54. https://doi.org/10.5281/zenodo.1410225.

Full text
Abstract:
 With the increase in communication channels between various stakeholders in e Governance scenario, offering secure e-Services by means of Authentication and Authorization became a crucial part. The multi factor authentication (MF) provides better protection effectively than the age old password based authentication. Governments are making efforts to establish multi factor authentication without comprising on provisioning the e-services. https://journalnx.com/journal-article/20150679
APA, Harvard, Vancouver, ISO, and other styles
14

Jiang, Jing, Xiaofeng Wang, Qianqian Xing, and Jin Tang. "ECC-based certificate-less multi-factor authentication scheme." Advances in Engineering Technology Research 12, no. 1 (2024): 551. https://doi.org/10.56028/aetr.12.1.551.2024.

Full text
Abstract:
Currently, personal information leakage and identity theft have become risks that cannot be ignored. As a robust authentication mechanism, multi-factor authentication (MFA) has gained prominence. However, many existing MFA schemes based on certificate-less public key cryptography amalgamate multiple authentication factors into a single factor for local verification, which fails to achieve independent authentication of each factor and is difficult to resist internal privilege attacks. To address these issues, this paper proposes a certificate-less multi-factor privacy authentication scheme base
APA, Harvard, Vancouver, ISO, and other styles
15

Bezzateev, Sergey, Vadim Davydov, and Aleksandr Ometov. "On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication." Cryptography 4, no. 4 (2020): 34. http://dx.doi.org/10.3390/cryptography4040034.

Full text
Abstract:
Security and access control aspects are becoming more and more essential to consider during the design of various systems and the tremendous growth of digitization. One of the related key building blocks in this regard is, essentially, the authentication process. Conventional schemes based on one or two authenticating factors can no longer provide the required levels of flexibility and pro-activity of the access procedures, thus, the concept of threshold-based multi-factor authentication (MFA) was introduced, in which some of the factors may be missing, but the access can still be granted. In
APA, Harvard, Vancouver, ISO, and other styles
16

Han, Jinho. "CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and Passwords." Applied Sciences 14, no. 12 (2024): 5019. http://dx.doi.org/10.3390/app14125019.

Full text
Abstract:
Multi-factor authentication (MFA) is a system for authenticating an individual’s identity using two or more pieces of data (known as factors). The reason for using more than two factors is to further strengthen security through the use of additional data for identity authentication. Sequential MFA requires a number of steps to be followed in sequence for authentication; for example, with three factors, the system requires three authentication steps. In this case, to proceed with MFA using a deep learning approach, three artificial neural networks (ANNs) are needed. In contrast, in parallel MFA
APA, Harvard, Vancouver, ISO, and other styles
17

Baafi, Benjamin. "Multi-Factor Authentication for Online Security of Android Devices." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 77–80. http://dx.doi.org/10.22624/aims/crp-bk3-p13.

Full text
Abstract:
Digitalization decisively penetrates all the sides of modern society. One of the critical enablers to maintaining this process secure is using Authentication. It spreads many different areas of a hyper-connected world, including online payments, communications, access-right management, and others. This paper sheds light on the evolution of authentication systems toward Multi-Factor Authentication (MFA). Multi-factor Authentication is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable Authentication when accessing a service. This paper sur
APA, Harvard, Vancouver, ISO, and other styles
18

Norah, Alyousif, and Alhabis Sultan. "The Necessity of Multi Factor Authentication." International Journal of Computer Science and Information Technology Research 10, no. 2 (2022): 46–49. https://doi.org/10.5281/zenodo.6472757.

Full text
Abstract:
<strong>Abstract:</strong> Multifactor authentication (MFA) is one of the most secure authentication methods. It covers a wide range of topics in a cyber-connected environment, such as online payments, communications, and access right management, among others. Multifactor authentication is usually a little complicated because it necessitates an extra step on the part of the user. With two-factor authentication, in addition to the user ID and password, the user must additionally input a special code that they usually receive through SMS or a special code that they have received in advance. This
APA, Harvard, Vancouver, ISO, and other styles
19

Otta, Soumya Prakash, Subhrakanta Panda, Maanak Gupta, and Chittaranjan Hota. "A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure." Future Internet 15, no. 4 (2023): 146. http://dx.doi.org/10.3390/fi15040146.

Full text
Abstract:
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authentication towards robustness. User names and associated passwords have been a common practice for long as Single Factor Authentication. However, advancements in the speed of computing and the usage of simple methods, starting from the Brute Force technique to the implementation of advanced and efficient cr
APA, Harvard, Vancouver, ISO, and other styles
20

Rezanov, Bohdan, and Heorhii Kuchuk. "MODELING THE PROCESS OF TWO-FACTOR AUTHENTICATION." Advanced Information Systems 6, no. 2 (2022): 10–15. http://dx.doi.org/10.20998/2522-9052.2022.2.02.

Full text
Abstract:
The relevance of research. Authentication is the process of confirming the authenticity of an object or subject of interaction in an information network by a presented identifier. Usually only one factor is used. However, most information security incidents occur due to the use of one factor. The easiest way to create an extra layer of security for accounts is to use two-factor authentication using 2FA programs. In this case, an additional step occurs, which increases the user authentication time and creates an additional load on the network. Thus, there is a need to create an additional layer
APA, Harvard, Vancouver, ISO, and other styles
21

Baseer, Shagufta. "Multi-Factor Authentication: A User Experience Study." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36006.

Full text
Abstract:
Usability issues prevent multi-factor authentication (MFA) systems from being widely used, despite the fact that they are essential for improving security measures. This study explores the problems with MFA systems' usability and suggests possible fixes to enhance the user experience. The study emphasizes the value of good design while highlighting the efficacy of graphical password systems as a user-friendly substitute for conventional MFA techniques. The report also makes recommendations for future research directions, such as assessing resilience against complex assaults, improving support
APA, Harvard, Vancouver, ISO, and other styles
22

KRISHNAN, ARATHY. "THREE LEVEL SECURITY AUTHENTICATION IN ONLINE BANKING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28479.

Full text
Abstract:
Authentication, security, and confidentiality are some of the most important topics of cyber security. There have been many solutions presented to users for strengthening the security of login password-based authentication methods. Primarily this has been through the use of two-factor authentication methods. Two-factor authentication is the combination of single factor authentication mechanisms. The growing popularity and acceptance of two-factor methods are driven by the increasing need for privacy and security in this technological age. The success and popularity of adapted security measures
APA, Harvard, Vancouver, ISO, and other styles
23

Xu, Yanbin, Xinya Jian, Tao Li, Shuang Zou, and Beibei Li. "Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy." Mobile Information Systems 2023 (November 14, 2023): 1–13. http://dx.doi.org/10.1155/2023/4764135.

Full text
Abstract:
Authentication is of paramount significance to cybersecurity. However, most of conventional authentication schemes are implemented in a centralized mode, in which potential problems that could arise include single-point failure, the exposure of personal information, and the risk of identity theft. Additionally, static single-factor authentication schemes are unsuitable for dynamic environments like mobile applications. In order to tackle these difficulties, we propose a blockchain-based authentication scheme with an adaptive multi-factor authentication strategy. Our scheme features a blockchai
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Jianxin, Zifan Xu, Xiangze Chang, Chaoen Xiao, and Lei Zhang. "Design and Implementation of USB Key System Based on Dual-Factor Identity Authentication Protocol." Journal of Electronic Research and Application 8, no. 5 (2024): 161–67. http://dx.doi.org/10.26689/jera.v8i5.8398.

Full text
Abstract:
With the increasing demand for information security, traditional single-factor authentication technology can no longer meet security requirements. To this end, this paper proposes a Universal Serial Bus (USB) Key hardware and software system based on a two-factor authentication protocol, aiming to improve the security and reliability of authentication. This paper first analyzes the current status and technical principles of USB Key-related research domestically and internationally and designs a two-factor authentication protocol that combines impact/response authentication and static password
APA, Harvard, Vancouver, ISO, and other styles
25

Nigam, Dhananjay, Shilp Nirajbhai Patel, P. M. Durai Raj Vincent, Kathiravan Srinivasan, and Sinouvassane Arunmozhi. "Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems." Journal of Healthcare Engineering 2022 (March 24, 2022): 1–15. http://dx.doi.org/10.1155/2022/1789996.

Full text
Abstract:
Secure identification is a critical system requirement for patients seeking health-related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the unprotected environment in this study, in which patients can receive health services from the hospital’s smart and intelligent surroundings without the use of explicit equipment. Patients would interact directly with the environment and be identified through it. We suggest a biometric-based authentication technique for the un
APA, Harvard, Vancouver, ISO, and other styles
26

Herrera-Cubides, Jhon Francined, Paulo Alonso Gaona-García, and Geiner Alexis Salcedo-Salgado. "Towards the Construction of a User Unique Authentication Mechanism on LMS Platforms through Model-Driven Engineering (MDE)." Scientific Programming 2019 (March 11, 2019): 1–16. http://dx.doi.org/10.1155/2019/9313571.

Full text
Abstract:
In LOD, authentication is a key factor in the security dimension of linked data quality models. This is the case of (a) LMS that manages open educational resources (OERs), in training process, and (b) LMS integrated platforms, which also require authenticating users. Authentication tackles a range of problems such as users forgetting passwords and time consumption in repetitive logins in different applications. In the context of linked OERs that are developed in LMS, it is necessary to design guidelines in order to carry out the authentication process. This process authorizes access to differe
APA, Harvard, Vancouver, ISO, and other styles
27

Choi, Younsung. "Cryptanalysis on Privacy-Aware Two-factor Authentication Protocol for Wireless Sensor Networks." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 1 (2018): 605. http://dx.doi.org/10.11591/ijece.v8i1.pp605-610.

Full text
Abstract:
Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been proposed. To resolve the security and efficiency problems of ECC-based two-factor authentication protocols, Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSNs. Ho
APA, Harvard, Vancouver, ISO, and other styles
28

Younsung, Choi. "Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireless Sensor Networks." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 1 (2020): 605–10. https://doi.org/10.11591/ijece.v8i1.pp605-610.

Full text
Abstract:
Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been proposed. To resolve the security and efficiency problems of ECC-based two-factor authentication protocols, Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSNs. Ho
APA, Harvard, Vancouver, ISO, and other styles
29

G, Sheryl Sharon, Samuel Lalawmpuia, Priyadharshini M, Swarna Ambigai V, and S. Sharmiladevi. "Secure Tandem Authentication System." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 3277–81. http://dx.doi.org/10.22214/ijraset.2023.50866.

Full text
Abstract:
Abstract: This paper describes a method of implementing two factor authentication using password authentication and face authentication. The proposed method guarantees secure authentication to online banking and other areas of utilizing user credentials with the help of knowledge factor and biometric factor. The proposed method has been implemented and tested.
APA, Harvard, Vancouver, ISO, and other styles
30

Rajabboyeva, Surayyo Baxrom qizi Xalmuratov Omonboy Utamuratovich. "THE NECESSITY AND BENEFIT OF MULTI FACTOR AUTHENTICATION." INTERNATIONAL BULLETIN OF APPLIED SCIENCE AND TECHNOLOGY 3, no. 4 (2023): 960–64. https://doi.org/10.5281/zenodo.7882398.

Full text
Abstract:
One of the safest authentication techniques is multifactor authentication (MFA). It includes a wide variety of subjects in a cyber-connected environment, including control of access rights, communications, and online payments. Due to the extra step the user must do, multifactor authentication is typically a little difficult. With two-factor authentication, in addition to the user ID and password, the user must also enter a unique code, often sent to them through SMS or one they have already obtained. This essay will discuss the idea of MFA, the main distinctions between MFA and two-factor auth
APA, Harvard, Vancouver, ISO, and other styles
31

AlJanah, Salem, Ning Zhang, and Siok Wah Tay. "Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications." Cryptography 9, no. 2 (2025): 35. https://doi.org/10.3390/cryptography9020035.

Full text
Abstract:
As more Internet of Things (IoT) devices are being used, more sensitive data and services are also being hosted by, or accessed via, IoT devices. This leads to a need for a stronger authentication solution for the IoT context, and a stronger authentication solution tends to be based on several authentication factors. Existing multi-factor authentication solutions are mostly used for user-to-system identity verification scenarios, whereas, in the IoT context, there are device-to-device communication scenarios. Therefore, more work is necessary to investigate how to facilitate multi-factor authe
APA, Harvard, Vancouver, ISO, and other styles
32

Li, Wenting, Haibo Cheng, Ping Wang, and Kaitai Liang. "Practical Threshold Multi-Factor Authentication." IEEE Transactions on Information Forensics and Security 16 (2021): 3573–88. http://dx.doi.org/10.1109/tifs.2021.3081263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hooi, Yew Kwang, Khairul Shafee Kalid, and Serdarmammet Tachmammedov. "MULTI-FACTOR ATTENDANCE AUTHENTICATION SYSTEM." International Journal of Software Engineering and Computer Systems 4, no. 2 (2018): 62–79. http://dx.doi.org/10.15282/ijsecs.4.2.2018.5.0049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ometov, Aleksandr, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen, and Yevgeni Koucheryavy. "Multi-Factor Authentication: A Survey." Cryptography 2, no. 1 (2018): 1. http://dx.doi.org/10.3390/cryptography2010001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Yang, Zhenhua, and Jun Kong. "Cue-based two factor authentication." Computers & Security 146 (November 2024): 104068. http://dx.doi.org/10.1016/j.cose.2024.104068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Zhang, Jiliang, Xiao Tan, Xiangqi Wang, Aibin Yan, and Zheng Qin. "T2FA: Transparent Two-Factor Authentication." IEEE Access 6 (2018): 32677–86. http://dx.doi.org/10.1109/access.2018.2844548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Wenting, Li, Cheng Haibo, Wang Ping, and Liang Kaitai. "Practical Threshold Multi-Factor Authentication." IEEE Transactions on Information Forensics and Security Volume 16 (May 17, 2021): 3573–88. https://doi.org/10.1109/TIFS.2021.3081263.

Full text
Abstract:
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication ( tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in limiting the flexibility of factor usage, e.g., the user may prefer to choose any factors at hand for login authentication. To bring back usability and flexibility without loss of security, we introduce a new notion of authentication, called (t,n) threshold M
APA, Harvard, Vancouver, ISO, and other styles
38

Choi, Younsung. "Cryptanalysis on Privacy-aware two-factor Authentication Protocol for Wireless Sensor Networks." Indonesian Journal of Electrical Engineering and Computer Science 8, no. 2 (2017): 296. http://dx.doi.org/10.11591/ijeecs.v8.i2.pp296-301.

Full text
Abstract:
&lt;span&gt;Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been proposed. To resolve the security and efficiency problems of ECC-based two-factor authentication protocols, Jiang &lt;em&gt;et al&lt;/em&gt;. proposed a privacy-aware two-factor authentication p
APA, Harvard, Vancouver, ISO, and other styles
39

Mun, Hyung-Jin. "1.5-factor Authentication Method using Secure Keypads and Biometric Authentication in the Fintech." Journal of Industrial Convergence 20, no. 11 (2022): 191–96. http://dx.doi.org/10.22678/jic.2022.20.11.191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Pandey, Shivam, and Tewodros Taffese. "Using Performance Predictions to Evaluate Two-factor Authentication Setup Processes." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, no. 1 (2021): 999–1003. http://dx.doi.org/10.1177/1071181321651328.

Full text
Abstract:
Low user adoption due to usability issues during setup is one of the primary challenges facing two-factor authentication implementations. A method which could quickly provide performance predictions for two-factor authentication setup processes would help create opportunities for iterative improvements during the design phase. These improvements can lead to increased human performance in the two-factor authentication setup processes once implemented and may help address some of the usability challenges that plague two-factor authentication user adoption efforts. Various software-based predicti
APA, Harvard, Vancouver, ISO, and other styles
41

Kimani, Carolyne, James I. Obuhuma, and Emily Roche. "Multi-Factor Authentication for Improved Enterprise Resource Planning Systems Security." International Journal of Information Technology and Computer Science 15, no. 3 (2023): 42–54. http://dx.doi.org/10.5815/ijitcs.2023.03.04.

Full text
Abstract:
Universities across the globe have increasingly adopted Enterprise Resource Planning (ERP) systems, a software that provides integrated management of processes and transactions in real-time. These systems contain lots of information hence require secure authentication. Authentication in this case refers to the process of verifying an entity’s or device’s identity, to allow them access to specific resources upon request. However, there have been security and privacy concerns around ERP systems, where only the traditional authentication method of a username and password is commonly used. A passw
APA, Harvard, Vancouver, ISO, and other styles
42

Sooyeon Shin, Jongshin Kim, and Taekyoung Kwon. "Cryptanalysis of the Lightweight and Anonymous Authentication and Access Control for Real-time Applications in Wireless Sensor Networks." Research Briefs on Information and Communication Technology Evolution 5 (November 30, 2019): 86–92. http://dx.doi.org/10.56801/rebicte.v5i.87.

Full text
Abstract:
In wireless sensor networks, sensor nodes collect different types of data from the environment andnot all collected data has the same security importance. Basically, for real-time applications, user authenticationto ensure that only authorized users can access sensor nodes is critical, but access controlthat allows users with different privileges to access data according to their privileges is also important.Recently, Adavoudi-Jolfaei et al. proposed an improved three-factor authentication scheme byproviding more desired security properties such as three-factor authentication and access contro
APA, Harvard, Vancouver, ISO, and other styles
43

Bamashmos, Saeed, Naveen Chilamkurti, and Ahmad Salehi Shahraki. "Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in IoT Environment." Sensors 24, no. 11 (2024): 3575. http://dx.doi.org/10.3390/s24113575.

Full text
Abstract:
Abstract: Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmission. However, IoT devices are resource- and energy-constrained, so building lightweight security that provides stronger authentication is essential. This paper proposes a novel, two-layered multi-factor authentication (2L-MFA) framework using blockchain to enhance IoT devices and user security. The first level of authentication is for I
APA, Harvard, Vancouver, ISO, and other styles
44

Radhakrishnan, Niranchana, and Amutha Prabakar Muniyandi. "Dependable and Provable Secure Two-Factor Mutual Authentication Scheme Using ECC for IoT-Based Telecare Medical Information System." Journal of Healthcare Engineering 2022 (February 14, 2022): 1–15. http://dx.doi.org/10.1155/2022/9273662.

Full text
Abstract:
With the recent tremendous growth in technology, the Internet of Things (IoT) Telecare Medicine Information System (TMIS) is the most widely used medical information system with prominent achievements. Authentication schemes, which use Smart cards, offer the best solution for TMIS applications that in turn provide efficiency and security. Furthermore, authentication schemes that combine passwords and smart cards are considered to be an effective solution for the two-factor authentication scheme. Such schemes contribute to high security along with the public-key cryptosystem. In this research w
APA, Harvard, Vancouver, ISO, and other styles
45

Zavrak, Sultan, Seyhmus Yilmaz, Huseyin Bodur, and Sinan Toklu. "The implementation of two-factor web authentication system based on facial recognition." Global Journal of Computer Sciences: Theory and Research 7, no. 2 (2017): 68. http://dx.doi.org/10.18844/gjcs.v7i2.2715.

Full text
Abstract:
The security of the web is a very important issue, because every day we make a variety of operations in it, for different reasons, during the day. Apart from protecting the information, contacts, accounts and data on the web, such data should be inaccessible to third-party persons. This in turn depends on the success of the authentication process performed on the individual web. With authentication, it is possible for users to protect their information and make their transactions only for themselves. However, the authentication mechanism used at this point must have a high level of safety. Wit
APA, Harvard, Vancouver, ISO, and other styles
46

., Pankhuri, Akash Sinha, Gulshan Shrivastava, and Prabhat Kumar. "A Pattern-Based Multi-Factor Authentication System." Scalable Computing: Practice and Experience 20, no. 1 (2019): 101–12. http://dx.doi.org/10.12694/scpe.v20i1.1460.

Full text
Abstract:
User authentication is an indispensable part of a secure system. The traditional authentication methods have been proved to be vulnerable to different types of security attacks. Artificial intelligence is being applied to crack textual passwords and even CAPTCHAs are being dismantled within few attempts. The use of graphical password as an alternate to the textual passwords for user authentication can be an efficient strategy. However, they have been proved to be susceptible to shoulder surfing like attacks. Advanced authentication systems such as biometrics are secure but require additional i
APA, Harvard, Vancouver, ISO, and other styles
47

Mohammad, Majid Masroor, Mishra Kushagra, and Sasikala E. "Providing Security in Multiserver Authentication Scheme using Efficient Three Factor Encryption." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 2 (2020): 55–59. https://doi.org/10.35940/ijrte.A2877.079220.

Full text
Abstract:
For last couple of months, Using Two Factor Authentication was not so secure to protect the data inheriting from Multiserver Authentication. Providing Three Factor Authentication helped a lot in these fields to enhance the security while decrypting the encrypted files but failed in many aspects as there were no Multiserver Authentication was used. Here, the approach is used to provide security in Multiserver Platform Using Three Factor Encryption efficiently so as to remove 99.9% chances of failure in security from decryption of the files without going through Three Factor Security present at
APA, Harvard, Vancouver, ISO, and other styles
48

Kepkowski, Michal, Lucjan Hanzlik, Ian Wood, and Mohamed Ali Kaafar. "How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 705–26. http://dx.doi.org/10.56553/popets-2022-0129.

Full text
Abstract:
This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that allows attackers to link user accounts stored in vulnerable authenticators, a serious privacy concern. FIDO2 is a new standard specified by the FIDO industry alliance for secure token online authentication. It complements the W3C WebAuthn specification by providing means to use a USB token or other authenticator (which holds the secret authenticating material and implements FIDO protocols) as a second factor during the authentication process. From a cryptographic perspective, the protocol is a
APA, Harvard, Vancouver, ISO, and other styles
49

Shin, Seung-Soo, and Kun-Hee Han. "HMAC-based 3-factor Authentication using OTP." Journal of the Korea Academia-Industrial cooperation Society 10, no. 12 (2009): 3708–14. http://dx.doi.org/10.5762/kais.2009.10.12.3708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Alimzhanova, Zh M., N. J. Toibek, A. K. Ali, N. M. Niyazbek, D. R. Ashimzhanova, and M. A. Duisenova. "Analysis of multi-factor authentication solutions." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 91, no. 1 (2024): 30–38. http://dx.doi.org/10.47533/2024.1606-146x.03.

Full text
Abstract:
This article analyzes open-source multi-factor authentication (MFA) solutions. Research on adapting the MFA solution is given, this research will help businesses to provide security in the implementation of remote work. This article discusses 5 open-source MFA solutions, functionality, advantages and disadvantages. For Small and Medium-sized Businesses (SMBs), using a multi-factor authentication (MFA) solution is an important element of security. MFA is an authentication method that requires several forms of authentication before a user can access a system or application. For SMBs, using MFA h
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!