Academic literature on the topic 'Multifactor authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multifactor authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Multifactor authentication"
Kumar, Devender, and Vikram Singh. "Enhanced Multifactor Authentication Scheme." International Journal of Engineering Trends and Technology 52, no. 2 (October 25, 2017): 109–14. http://dx.doi.org/10.14445/22315381/ijett-v52p217.
Full textDeep, Gaurav, Paramroop Kaur, and Rajni Mohana. "Multifactor Authentication for Hospital Inventory access in Virtual Private Cloud." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 47. http://dx.doi.org/10.14419/ijet.v7i4.12.20991.
Full textMillán, María S., Elisabet Pérez-Cabré, and Bahram Javidi. "Multifactor authentication reinforces optical security." Optics Letters 31, no. 6 (March 15, 2006): 721. http://dx.doi.org/10.1364/ol.31.000721.
Full textSong, Jian, Guang-song Li, Bo-ru Xu, and Chuan-gui Ma. "A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service." Security and Communication Networks 2018 (November 19, 2018): 1–13. http://dx.doi.org/10.1155/2018/5432960.
Full textMahnken, Scott. "Today's authentication options: the need for adaptive multifactor authentication." Biometric Technology Today 2014, no. 7 (July 2014): 8–10. http://dx.doi.org/10.1016/s0969-4765(14)70126-2.
Full textReno, Jim. "Multifactor Authentication: Its Time Has Come." Technology Innovation Management Review 3, no. 8 (August 28, 2013): 51–58. http://dx.doi.org/10.22215/timreview716.
Full textReno, Jim. "Multifactor Authentication: Its Time Has Come." Technology Innovation Management Review 3, no. 8 (August 28, 2013): 51–58. http://dx.doi.org/10.22215/timreview/716.
Full textS.V, Suseenthiraraj, and Vijay Swaminath R. "Multifactor Authentication for ATM Security System." International Innovative Research Journal of Engineering and Technology 5, no. 3 (March 30, 2020): 112–19. http://dx.doi.org/10.32595/iirjet.org/v5i3.2020.124.
Full textAlthobaiti, Maha M., and Pam Mayhew. "Assessing Usable Security of Multifactor Authentication." Journal of Internet Technology and Secured Transaction 4, no. 4 (December 1, 2015): 421–26. http://dx.doi.org/10.20533/jitst.2046.3723.2015.0053.
Full textMuriki, Vigneshwar. "Multifactor Authentication in Automated Teller Machine." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1780–83. http://dx.doi.org/10.22214/ijraset.2021.39570.
Full textDissertations / Theses on the topic "Multifactor authentication"
Althobaiti, Maha. "Assessing usable security of multifactor authentication." Thesis, University of East Anglia, 2016. https://ueaeprints.uea.ac.uk/61540/.
Full textBorgman, Isabelle. "Scan me – Ökad säkerhet med multifactor authentication : En undersökning om effekten vid ökad säkerhet i digitala identifierare." Thesis, Linnéuniversitetet, Institutionen för medieteknik (ME), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-54084.
Full textThe following bachelor thesis examines an application based on three factors: security, usability and functionality. The work presents a prototype of an identification application that uses QR codes to identify a person. The identification process is supposed to work in eg a line to a pub. The QR-code is in the guest's mobile and the doorman uses the prototype, which this thesis presents, on a tablet or smartphone and scan the guest's QR code. The aim is to investigate how the usability and functionality is affected in an application when it is added a factor that increases the apps security. This is examined through a user test where 8 test subjects will test the developed prototype and provide feedback both from a guest and a doormans perspective. The results show that the usability decreases while the security increases. The identification with the QR reader takes about 4 seconds longer than it does to identify with the usual method, i.e. comparing an ID card with a membership card. The functionality in the system increases because we add the functionality to scan a QR-code and compare it's information with a database. The prototype that has been developed in this bachelor thesis has development potential and can be used in other contexts and in other environments; for example the prototype would work equally well in a business context in which the business can replace their membership card with a QR code and a reader to give their customers benefits.
Dlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.
Full textThesis (PhD)--University of Pretoria, 2020.
Computer Science
PhD
Unrestricted
Лобанов, Сергій Олександрович. "Удосконалені методи автентифікації в системах обміну миттєвими повідомленнями." Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/27191.
Full textThe work includes 104 pages, 2 images, 16 links and 25 tables. The object of research are user authentication and their messages authentication based on extracted behavioral patterns during communication at instant messaging services. The subject of this qualification is multifactor authentication methods and improvement approaches for machine learning classification methods of user messages authentication by analyzing the characteristics of dialogue in order to use the key features of dialogue in the applications of instant messaging. The aim of this qualification work is improvement of security of instant messaging systems by building of mechanism with reliable methods of user authentication and improved messages authentication methods for prevention of information leakage based on extracted behavioral patterns of users during communication at instant messaging services. Methods of research are analysis and comparison of multifactor authentication methods for users and messages based on user behavioral patterns extraction by analyzing of user dialogues during messaging, building of mechanism for user and message authentication. The result of the work is a system with the multifactor authentication and improved messages authentication information leakage prevention during instant messaging.
Neves, Pedro Fonseca das. "Multifactor authentication using smartphone as token." Master's thesis, 2015. http://hdl.handle.net/10071/11150.
Full textA biometria é uma área de estudo que observou desenvolvimentos relevantes na última década. Em específico, a biometria baseada no eletrocardiograma (ECG) é atualmente considerada uma fonte de identificação confiável. Um dos maiores avanços nesta tecnologia consiste na evolução da autenticação off-the-person, que permite realizar a aquisição de sinal de forma não intrusiva usando as mãos do utilizador. Contudo, a identificação através deste método ainda apresenta uma performance relativamente baixa quando usada uma base de dados de dimensão acima das dezenas. Nesta dissertação sugerimos usar a autenticação ECG associada a um telemóvel a funcionar como security token com o objectivo de melhorar a performance e diminuir o tempo necessário para o reconhecimento. Para isso, desenvolvemos a nossa solução usando a tecnologia Bluetooth (BL) clássico, mas também Bluetooth Low Energy (BLE) para preservar a bateria do telemóvel; além disto, desenvolvemos as aplicações em Windows Phone e também Android, dadas as limitações que encontrámos. Para criar um ambiente mais versátil e móvel, usámos a recente plataforma Intel Edison. Os resultados obtidos provam que a nossa solução é viável. Executámos uma série de testes, nos quais observámos uma melhoria nos tempos associados à autenticação quando comparados com o cenário clássico de identificação por ECG. Adicionalmente, a performance do ECG no que diz respeito ao número de falsos-negativos e falsos-positivos apresentou também melhoria.
Books on the topic "Multifactor authentication"
National Institute of Standards and Technology (U.S.) and RAND Homeland Security and Defense Center, eds. Influences on the adoption of multifactor authentication. Santa Monica: RAND, 2011.
Find full textLibicki, Martin C. Influences on the adoption of multifactor authentication. Santa Monica: RAND, 2011.
Find full textHacking Multifactor Authentication. Wiley & Sons, Limited, John, 2020.
Find full textBook chapters on the topic "Multifactor authentication"
Sahay, Rahul. "Multifactor Authentication." In Microsoft Azure Architect Technologies Study Companion, 561–84. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6200-9_15.
Full textLikitha, Soorea, and R. Saravanan. "Cryptanalysis of a Multifactor Authentication Protocol." In Advances in Intelligent Systems and Computing, 35–42. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8639-7_4.
Full textZiyad, Shabana, and A. Kannammal. "A Multifactor Biometric Authentication for the Cloud." In Advances in Intelligent Systems and Computing, 395–403. New Delhi: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-1680-3_43.
Full textAbhishek, Kumar, Sahana Roshan, Prabhat Kumar, and Rajeev Ranjan. "A Comprehensive Study on Multifactor Authentication Schemes." In Advances in Computing and Information Technology, 561–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31552-7_57.
Full textShashikumar, Spandana, and B. S. Manohar. "Multifactor Authentication for Smart Grid Cyber Security." In Lecture Notes in Networks and Systems, 537–47. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0980-0_52.
Full textMore, Dhanshree, Bhushan Deore, and Surendra Bhosale. "Multifactor Biometric Authentication for Cloud Computing Security." In Proceedings of International Conference on Communication and Artificial Intelligence, 389–97. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0976-4_32.
Full textKarpagam, G. R., A. Mukeshpandi, K. S. Sanjay Krishnan, and S. Vanjinathan. "AI Powered Partially Parallelized Scheme for Multifactor Authentication." In Smart Techniques for a Smarter Planet, 91–115. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03131-2_6.
Full textDiaz-Tellez, Yair H., Eliane L. Bodanese, Theo Dimitrakos, and Michael Turner. "Context-Aware Multifactor Authentication Based on Dynamic Pin." In ICT Systems Security and Privacy Protection, 330–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_27.
Full textSanyal, Sugata, Ayu Tiwari, and Sudip Sanyal. "A Multifactor Secure Authentication System for Wireless Payment." In Emergent Web Intelligence: Advanced Information Retrieval, 341–69. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-074-8_13.
Full textBhalla, Rachit, and N. Jeyanthi. "M2U2: Multifactor Mobile Based Unique User Authentication Mechanism." In Advances in Intelligent Systems and Computing, 455–64. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16657-1_42.
Full textConference papers on the topic "Multifactor authentication"
BARBU, Ionuţ-Daniel, and Gabriel PETRICĂ. "Multifactor Authentication." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2014. http://dx.doi.org/10.19107/cybercon.2014.01.
Full textPavlovski, Christopher, Claudia Warwar, Brett Paskin, and Gary Chan. "Unified framework for multifactor authentication." In 2015 22nd International Conference on Telecommunications (ICT). IEEE, 2015. http://dx.doi.org/10.1109/ict.2015.7124684.
Full textChudá, Daniela, and Michal Ďurfina. "Multifactor authentication based on keystroke dynamics." In the International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1731740.1731836.
Full textJoshi, Ashish, Sonu Kumar, and R. H. Goudar. "A More Multifactor Secure Authentication Scheme Based on Graphical Authentication." In 2012 International Conference on Advances in Computing and Communications (ICACC). IEEE, 2012. http://dx.doi.org/10.1109/icacc.2012.43.
Full textUtomo, Subroto Budhi, and Bayu Hendradjaya. "Multifactor Authentication on Mobile Secure Attendance System." In 2018 International Conference on ICT for Smart Society (ICISS). IEEE, 2018. http://dx.doi.org/10.1109/ictss.2018.8550017.
Full textNjaka, Adokiye Charles, Na Li, and Lin Li. "Voice Controlled Smart Mirror with Multifactor Authentication." In 2018 IEEE International Smart Cities Conference (ISC2). IEEE, 2018. http://dx.doi.org/10.1109/isc2.2018.8656932.
Full textAdukkathayar, Anirudhan, Gokul S. Krishnan, and Rajashree Chinchole. "Secure multifactor authentication payment system using NFC." In 2015 10th International Conference on Computer Science & Education (ICCSE). IEEE, 2015. http://dx.doi.org/10.1109/iccse.2015.7250269.
Full textMillán, María S., Elisabet Pérez-Cabré, and Bahram Javidi. "High secure authentication by optical multifactor ID tags." In Optics/Photonics in Security and Defence, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.689886.
Full textOke, B. A., O. M. Olaniyi, A. A. Aboaba, and O. T. Arulogun. "Developing multifactor authentication technique for secure electronic voting system." In 2017 International Conference on Computing Networking and Informatics (ICCNI). IEEE, 2017. http://dx.doi.org/10.1109/iccni.2017.8123773.
Full textKuseler, Torben, Ihsan A. Lami, and Hisham Al-Assam. "Location-assured, multifactor authentication on smartphones via LTE communication." In SPIE Defense, Security, and Sensing, edited by Sos S. Agaian, Sabah A. Jassim, and Eliza Y. Du. SPIE, 2013. http://dx.doi.org/10.1117/12.2018027.
Full textReports on the topic "Multifactor authentication"
Newhouse, William. Multifactor authentication for e-commerce. Gaithersburg, MD: National Institute of Standards and Technology, July 2019. http://dx.doi.org/10.6028/nist.sp.1800-17.
Full text