Mohammed et al., 2023 - Google Patents
Current multi-factor of authentication: Approaches, requirements, attacks and challengesMohammed et al., 2023
View PDF- Document ID
- 3293311767312410982
- Author
- Mohammed A
- Dziyauddin R
- Latiff L
- Publication year
- Publication venue
- International Journal of Advanced Computer Science and Applications
External Links
Snippet
Now-a-days, with the rapid and broad emergence of local or remote access to services on the internet. Authentication represents an important security control requirement and the MFA is recommended to mitigate the weaknesses in the SFA. MFA techniques can be …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ferrag et al. | Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues | |
| Mohammed et al. | Current multi-factor of authentication: Approaches, requirements, attacks and challenges | |
| Punithavathi et al. | A lightweight machine learning-based authentication framework for smart IoT devices | |
| Parmar et al. | A comprehensive study on passwordless authentication | |
| Xi et al. | A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment | |
| Choi et al. | A mobile based anti-phishing authentication scheme using QR code | |
| US20160219046A1 (en) | System and method for multi-modal biometric identity verification | |
| Karim et al. | Online banking user authentication methods: a systematic literature review | |
| Limbasiya et al. | An analytical study of biometric based remote user authentication schemes using smart cards | |
| Praveen Kumar et al. | A password less authentication protocol for multi-server environment using physical unclonable function | |
| Abiew et al. | Design and implementation of cost effective multi-factor authentication framework for ATM systems | |
| Boonkrong | Methods and threats of authentication | |
| Al Kabir et al. | An overview of the present and future of user authentication | |
| Goel et al. | LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks | |
| Boonkrong | Multi-factor authentication | |
| Rawther et al. | Protecting cloud computing environments from malicious attacks using multi-factor authentication and modified dna cryptography | |
| Abdulmalik et al. | Secure two-factor mutual authentication scheme using shared image in medical healthcare environment | |
| Alsumayt et al. | Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT) | |
| Szymoniak et al. | Biometry-based verification system with symmetric key generation method for internet of things environments | |
| Thawre et al. | Survey on security of biometric data using cryptography | |
| Wong et al. | An enhanced user authentication solution for mobile payment systems using wearables | |
| Saravanan et al. | CloudSec (3FA): a multifactor with dynamic click colour-based dynamic authentication for securing cloud environment | |
| Wilusz et al. | Security analysis of transaction authorization methods for next generation electronic payment services | |
| Waheed et al. | Secure login protocols: An analysis on modern attacks and solutions | |
| Alkhalifah | Password based authentication for web based graphics computing services retrieval in cloud |