Journal articles on the topic 'Factor Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Factor Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Putri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.
Full textPapaspirou, Vassilis, Maria Papathanasaki, Leandros Maglaras, et al. "A Novel Authentication Method That Combines Honeytokens and Google Authenticator." Information 14, no. 7 (2023): 386. http://dx.doi.org/10.3390/info14070386.
Full textPranata, Sunderi, Hargyo Tri Nugroho, and Hirofumi Yamaki. "Analisis dan Implementasi Protokol Otentikasi FIDO U2F." Jurnal ULTIMA Computing 9, no. 1 (2017): 30–35. http://dx.doi.org/10.31937/sk.v9i1.571.
Full textSchneier, Bruce. "Two-factor authentication." Communications of the ACM 48, no. 4 (2005): 136. http://dx.doi.org/10.1145/1053291.1053327.
Full textReddy, Anuradha. "B00B-Factor Authentication." Interactions 30, no. 1 (2023): 12–13. http://dx.doi.org/10.1145/3576026.
Full textCarrillo-Torres, Diego, Jesús Arturo Pérez-Díaz, Jose Antonio Cantoral-Ceballos, and Cesar Vargas-Rosales. "A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations." Applied Sciences 13, no. 3 (2023): 1374. http://dx.doi.org/10.3390/app13031374.
Full textRusdan, Muchamad. "Designing of User Authentication Based on Multi-factor Authentication on Wireless Networks." Journal of Advanced Research in Dynamical and Control Systems 12, no. 1 (2020): 201–9. http://dx.doi.org/10.5373/jardcs/v12i1/20201030.
Full textPatel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.
Full textDostálek, L., and J. Šafařík. "MULTI-FACTOR AUTHENTICATION MODELLING." Radio Electronics, Computer Science, Control, no. 2 (September 8, 2020): 106–16. http://dx.doi.org/10.15588/1607-3274-2020-2-11.
Full textRussell, Steve. "Bypassing Multi-Factor Authentication." ITNOW 65, no. 1 (2023): 42–45. http://dx.doi.org/10.1093/combul/bwad023.
Full textMatsui, Masahiro, Hiroaki Ohtsuka, Tetsutaro Kobayashi, Hironobu Okuyama, Akira Nagai, and Go Yamamoto. "Milagro Multi-Factor Authentication." NTT Technical Review 14, no. 12 (2016): 55–61. http://dx.doi.org/10.53829/ntr201612ra1.
Full textShinde1, Aditya S. "Multi-Factor Authentication: A Comprehensive Review." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50831.
Full textRAMA, YERRAMILLI, and NIRMALA KUMAR SWAMY DR. "A COMPARATIVE STUDY OF TRADITIONAL AUTHENTICATION AND AUTHORIZATION METHODS WITH BLOCK CHAIN TECHNOLOGY FOR E GOVERNANCE SERVICES." JournalNX - A Multidisciplinary Peer Reviewed Journal ICACTM (May 4, 2018): 149–54. https://doi.org/10.5281/zenodo.1410225.
Full textJiang, Jing, Xiaofeng Wang, Qianqian Xing, and Jin Tang. "ECC-based certificate-less multi-factor authentication scheme." Advances in Engineering Technology Research 12, no. 1 (2024): 551. https://doi.org/10.56028/aetr.12.1.551.2024.
Full textBezzateev, Sergey, Vadim Davydov, and Aleksandr Ometov. "On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication." Cryptography 4, no. 4 (2020): 34. http://dx.doi.org/10.3390/cryptography4040034.
Full textHan, Jinho. "CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and Passwords." Applied Sciences 14, no. 12 (2024): 5019. http://dx.doi.org/10.3390/app14125019.
Full textBaafi, Benjamin. "Multi-Factor Authentication for Online Security of Android Devices." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 77–80. http://dx.doi.org/10.22624/aims/crp-bk3-p13.
Full textNorah, Alyousif, and Alhabis Sultan. "The Necessity of Multi Factor Authentication." International Journal of Computer Science and Information Technology Research 10, no. 2 (2022): 46–49. https://doi.org/10.5281/zenodo.6472757.
Full textOtta, Soumya Prakash, Subhrakanta Panda, Maanak Gupta, and Chittaranjan Hota. "A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure." Future Internet 15, no. 4 (2023): 146. http://dx.doi.org/10.3390/fi15040146.
Full textRezanov, Bohdan, and Heorhii Kuchuk. "MODELING THE PROCESS OF TWO-FACTOR AUTHENTICATION." Advanced Information Systems 6, no. 2 (2022): 10–15. http://dx.doi.org/10.20998/2522-9052.2022.2.02.
Full textBaseer, Shagufta. "Multi-Factor Authentication: A User Experience Study." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36006.
Full textKRISHNAN, ARATHY. "THREE LEVEL SECURITY AUTHENTICATION IN ONLINE BANKING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28479.
Full textXu, Yanbin, Xinya Jian, Tao Li, Shuang Zou, and Beibei Li. "Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy." Mobile Information Systems 2023 (November 14, 2023): 1–13. http://dx.doi.org/10.1155/2023/4764135.
Full textWang, Jianxin, Zifan Xu, Xiangze Chang, Chaoen Xiao, and Lei Zhang. "Design and Implementation of USB Key System Based on Dual-Factor Identity Authentication Protocol." Journal of Electronic Research and Application 8, no. 5 (2024): 161–67. http://dx.doi.org/10.26689/jera.v8i5.8398.
Full textNigam, Dhananjay, Shilp Nirajbhai Patel, P. M. Durai Raj Vincent, Kathiravan Srinivasan, and Sinouvassane Arunmozhi. "Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems." Journal of Healthcare Engineering 2022 (March 24, 2022): 1–15. http://dx.doi.org/10.1155/2022/1789996.
Full textHerrera-Cubides, Jhon Francined, Paulo Alonso Gaona-García, and Geiner Alexis Salcedo-Salgado. "Towards the Construction of a User Unique Authentication Mechanism on LMS Platforms through Model-Driven Engineering (MDE)." Scientific Programming 2019 (March 11, 2019): 1–16. http://dx.doi.org/10.1155/2019/9313571.
Full textChoi, Younsung. "Cryptanalysis on Privacy-Aware Two-factor Authentication Protocol for Wireless Sensor Networks." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 1 (2018): 605. http://dx.doi.org/10.11591/ijece.v8i1.pp605-610.
Full textYounsung, Choi. "Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireless Sensor Networks." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 1 (2020): 605–10. https://doi.org/10.11591/ijece.v8i1.pp605-610.
Full textG, Sheryl Sharon, Samuel Lalawmpuia, Priyadharshini M, Swarna Ambigai V, and S. Sharmiladevi. "Secure Tandem Authentication System." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 3277–81. http://dx.doi.org/10.22214/ijraset.2023.50866.
Full textRajabboyeva, Surayyo Baxrom qizi Xalmuratov Omonboy Utamuratovich. "THE NECESSITY AND BENEFIT OF MULTI FACTOR AUTHENTICATION." INTERNATIONAL BULLETIN OF APPLIED SCIENCE AND TECHNOLOGY 3, no. 4 (2023): 960–64. https://doi.org/10.5281/zenodo.7882398.
Full textAlJanah, Salem, Ning Zhang, and Siok Wah Tay. "Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications." Cryptography 9, no. 2 (2025): 35. https://doi.org/10.3390/cryptography9020035.
Full textLi, Wenting, Haibo Cheng, Ping Wang, and Kaitai Liang. "Practical Threshold Multi-Factor Authentication." IEEE Transactions on Information Forensics and Security 16 (2021): 3573–88. http://dx.doi.org/10.1109/tifs.2021.3081263.
Full textHooi, Yew Kwang, Khairul Shafee Kalid, and Serdarmammet Tachmammedov. "MULTI-FACTOR ATTENDANCE AUTHENTICATION SYSTEM." International Journal of Software Engineering and Computer Systems 4, no. 2 (2018): 62–79. http://dx.doi.org/10.15282/ijsecs.4.2.2018.5.0049.
Full textOmetov, Aleksandr, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen, and Yevgeni Koucheryavy. "Multi-Factor Authentication: A Survey." Cryptography 2, no. 1 (2018): 1. http://dx.doi.org/10.3390/cryptography2010001.
Full textYang, Zhenhua, and Jun Kong. "Cue-based two factor authentication." Computers & Security 146 (November 2024): 104068. http://dx.doi.org/10.1016/j.cose.2024.104068.
Full textZhang, Jiliang, Xiao Tan, Xiangqi Wang, Aibin Yan, and Zheng Qin. "T2FA: Transparent Two-Factor Authentication." IEEE Access 6 (2018): 32677–86. http://dx.doi.org/10.1109/access.2018.2844548.
Full textWenting, Li, Cheng Haibo, Wang Ping, and Liang Kaitai. "Practical Threshold Multi-Factor Authentication." IEEE Transactions on Information Forensics and Security Volume 16 (May 17, 2021): 3573–88. https://doi.org/10.1109/TIFS.2021.3081263.
Full textChoi, Younsung. "Cryptanalysis on Privacy-aware two-factor Authentication Protocol for Wireless Sensor Networks." Indonesian Journal of Electrical Engineering and Computer Science 8, no. 2 (2017): 296. http://dx.doi.org/10.11591/ijeecs.v8.i2.pp296-301.
Full textMun, Hyung-Jin. "1.5-factor Authentication Method using Secure Keypads and Biometric Authentication in the Fintech." Journal of Industrial Convergence 20, no. 11 (2022): 191–96. http://dx.doi.org/10.22678/jic.2022.20.11.191.
Full textPandey, Shivam, and Tewodros Taffese. "Using Performance Predictions to Evaluate Two-factor Authentication Setup Processes." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, no. 1 (2021): 999–1003. http://dx.doi.org/10.1177/1071181321651328.
Full textKimani, Carolyne, James I. Obuhuma, and Emily Roche. "Multi-Factor Authentication for Improved Enterprise Resource Planning Systems Security." International Journal of Information Technology and Computer Science 15, no. 3 (2023): 42–54. http://dx.doi.org/10.5815/ijitcs.2023.03.04.
Full textSooyeon Shin, Jongshin Kim, and Taekyoung Kwon. "Cryptanalysis of the Lightweight and Anonymous Authentication and Access Control for Real-time Applications in Wireless Sensor Networks." Research Briefs on Information and Communication Technology Evolution 5 (November 30, 2019): 86–92. http://dx.doi.org/10.56801/rebicte.v5i.87.
Full textBamashmos, Saeed, Naveen Chilamkurti, and Ahmad Salehi Shahraki. "Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in IoT Environment." Sensors 24, no. 11 (2024): 3575. http://dx.doi.org/10.3390/s24113575.
Full textRadhakrishnan, Niranchana, and Amutha Prabakar Muniyandi. "Dependable and Provable Secure Two-Factor Mutual Authentication Scheme Using ECC for IoT-Based Telecare Medical Information System." Journal of Healthcare Engineering 2022 (February 14, 2022): 1–15. http://dx.doi.org/10.1155/2022/9273662.
Full textZavrak, Sultan, Seyhmus Yilmaz, Huseyin Bodur, and Sinan Toklu. "The implementation of two-factor web authentication system based on facial recognition." Global Journal of Computer Sciences: Theory and Research 7, no. 2 (2017): 68. http://dx.doi.org/10.18844/gjcs.v7i2.2715.
Full text., Pankhuri, Akash Sinha, Gulshan Shrivastava, and Prabhat Kumar. "A Pattern-Based Multi-Factor Authentication System." Scalable Computing: Practice and Experience 20, no. 1 (2019): 101–12. http://dx.doi.org/10.12694/scpe.v20i1.1460.
Full textMohammad, Majid Masroor, Mishra Kushagra, and Sasikala E. "Providing Security in Multiserver Authentication Scheme using Efficient Three Factor Encryption." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 2 (2020): 55–59. https://doi.org/10.35940/ijrte.A2877.079220.
Full textKepkowski, Michal, Lucjan Hanzlik, Ian Wood, and Mohamed Ali Kaafar. "How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 705–26. http://dx.doi.org/10.56553/popets-2022-0129.
Full textShin, Seung-Soo, and Kun-Hee Han. "HMAC-based 3-factor Authentication using OTP." Journal of the Korea Academia-Industrial cooperation Society 10, no. 12 (2009): 3708–14. http://dx.doi.org/10.5762/kais.2009.10.12.3708.
Full textAlimzhanova, Zh M., N. J. Toibek, A. K. Ali, N. M. Niyazbek, D. R. Ashimzhanova, and M. A. Duisenova. "Analysis of multi-factor authentication solutions." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 91, no. 1 (2024): 30–38. http://dx.doi.org/10.47533/2024.1606-146x.03.
Full text