+

Mohammed et al., 2023 - Google Patents

Current multi-factor of authentication: Approaches, requirements, attacks and challenges

Mohammed et al., 2023

View PDF
Document ID
3293311767312410982
Author
Mohammed A
Dziyauddin R
Latiff L
Publication year
Publication venue
International Journal of Advanced Computer Science and Applications

External Links

Snippet

Now-a-days, with the rapid and broad emergence of local or remote access to services on the internet. Authentication represents an important security control requirement and the MFA is recommended to mitigate the weaknesses in the SFA. MFA techniques can be …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Ferrag et al. Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues
Mohammed et al. Current multi-factor of authentication: Approaches, requirements, attacks and challenges
Punithavathi et al. A lightweight machine learning-based authentication framework for smart IoT devices
Parmar et al. A comprehensive study on passwordless authentication
Xi et al. A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment
Choi et al. A mobile based anti-phishing authentication scheme using QR code
US20160219046A1 (en) System and method for multi-modal biometric identity verification
Karim et al. Online banking user authentication methods: a systematic literature review
Limbasiya et al. An analytical study of biometric based remote user authentication schemes using smart cards
Praveen Kumar et al. A password less authentication protocol for multi-server environment using physical unclonable function
Abiew et al. Design and implementation of cost effective multi-factor authentication framework for ATM systems
Boonkrong Methods and threats of authentication
Al Kabir et al. An overview of the present and future of user authentication
Goel et al. LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks
Boonkrong Multi-factor authentication
Rawther et al. Protecting cloud computing environments from malicious attacks using multi-factor authentication and modified dna cryptography
Abdulmalik et al. Secure two-factor mutual authentication scheme using shared image in medical healthcare environment
Alsumayt et al. Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT)
Szymoniak et al. Biometry-based verification system with symmetric key generation method for internet of things environments
Thawre et al. Survey on security of biometric data using cryptography
Wong et al. An enhanced user authentication solution for mobile payment systems using wearables
Saravanan et al. CloudSec (3FA): a multifactor with dynamic click colour-based dynamic authentication for securing cloud environment
Wilusz et al. Security analysis of transaction authorization methods for next generation electronic payment services
Waheed et al. Secure login protocols: An analysis on modern attacks and solutions
Alkhalifah Password based authentication for web based graphics computing services retrieval in cloud
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载