Journal articles on the topic 'Multifactor authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Multifactor authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kumar, Devender, and Vikram Singh. "Enhanced Multifactor Authentication Scheme." International Journal of Engineering Trends and Technology 52, no. 2 (October 25, 2017): 109–14. http://dx.doi.org/10.14445/22315381/ijett-v52p217.
Full textDeep, Gaurav, Paramroop Kaur, and Rajni Mohana. "Multifactor Authentication for Hospital Inventory access in Virtual Private Cloud." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 47. http://dx.doi.org/10.14419/ijet.v7i4.12.20991.
Full textMillán, María S., Elisabet Pérez-Cabré, and Bahram Javidi. "Multifactor authentication reinforces optical security." Optics Letters 31, no. 6 (March 15, 2006): 721. http://dx.doi.org/10.1364/ol.31.000721.
Full textSong, Jian, Guang-song Li, Bo-ru Xu, and Chuan-gui Ma. "A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service." Security and Communication Networks 2018 (November 19, 2018): 1–13. http://dx.doi.org/10.1155/2018/5432960.
Full textMahnken, Scott. "Today's authentication options: the need for adaptive multifactor authentication." Biometric Technology Today 2014, no. 7 (July 2014): 8–10. http://dx.doi.org/10.1016/s0969-4765(14)70126-2.
Full textReno, Jim. "Multifactor Authentication: Its Time Has Come." Technology Innovation Management Review 3, no. 8 (August 28, 2013): 51–58. http://dx.doi.org/10.22215/timreview716.
Full textReno, Jim. "Multifactor Authentication: Its Time Has Come." Technology Innovation Management Review 3, no. 8 (August 28, 2013): 51–58. http://dx.doi.org/10.22215/timreview/716.
Full textS.V, Suseenthiraraj, and Vijay Swaminath R. "Multifactor Authentication for ATM Security System." International Innovative Research Journal of Engineering and Technology 5, no. 3 (March 30, 2020): 112–19. http://dx.doi.org/10.32595/iirjet.org/v5i3.2020.124.
Full textAlthobaiti, Maha M., and Pam Mayhew. "Assessing Usable Security of Multifactor Authentication." Journal of Internet Technology and Secured Transaction 4, no. 4 (December 1, 2015): 421–26. http://dx.doi.org/10.20533/jitst.2046.3723.2015.0053.
Full textMuriki, Vigneshwar. "Multifactor Authentication in Automated Teller Machine." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1780–83. http://dx.doi.org/10.22214/ijraset.2021.39570.
Full textDineal Gumis, Myra Annatasha Umang, Travis Iran Money, Zetty Elica Affandi, Siti Najihah Sapuan, Mastura Tony, Mohd Haziq Qayyim Safian, and Nur Huda Hamka. "Biometric Blockchain-based Multifactor Privacy Perserving Authentication Scheme for VANETs." Journal of IT in Asia 9, no. 1 (November 30, 2021): 97–107. http://dx.doi.org/10.33736/jita.3851.2021.
Full textHan, Ziyi, Li Yang, Shen Wang, Sen Mu, and Qiang Liu. "Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing." Wireless Communications and Mobile Computing 2018 (September 12, 2018): 1–14. http://dx.doi.org/10.1155/2018/9149730.
Full textLakshmiPraveena, T., V. Ramachandran, and CH Rupa. "Attribute based Multifactor Authentication for Cloud Applications." International Journal of Computer Applications 80, no. 17 (October 18, 2013): 37–40. http://dx.doi.org/10.5120/13971-1474.
Full textBala, Tirupati, and Surinder Singh. "Implementation of Security System using Multifactor Authentication." International Journal of Computer Applications 156, no. 5 (December 15, 2016): 6–8. http://dx.doi.org/10.5120/ijca2016912427.
Full textPérez-Cabré, E., E. A. Mohammed, M. S. Millán, and H. L. Saadon. "Photon-counting multifactor optical encryption and authentication." Journal of Optics 17, no. 2 (January 22, 2015): 025706. http://dx.doi.org/10.1088/2040-8978/17/2/025706.
Full textMaciej, Bartlomiejczyk, El Fray Imed, and Miroslaw Kurkowski. "Multifactor Authentication Protocol in a Mobile Environment." IEEE Access 7 (2019): 157185–99. http://dx.doi.org/10.1109/access.2019.2948922.
Full textFakroon, Moneer, Fayez Gebali, and Mohammad Mamun. "Multifactor authentication scheme using physically unclonable functions." Internet of Things 13 (March 2021): 100343. http://dx.doi.org/10.1016/j.iot.2020.100343.
Full textDEVI PRIYA, K., and L. SUMALATHA. "TRUSTED HYBRID MULTIFACTOR AUTHENTICATION FOR CLOUD USERS." i-manager’s Journal on Cloud Computing 7, no. 1 (2020): 12. http://dx.doi.org/10.26634/jcc.7.1.16670.
Full textLIJAU, EMILLI. "MyMaster : A Multifactor Authentication Scheme for Smart Home Device." Journal of IT in Asia 9, no. 1 (November 30, 2021): 89–96. http://dx.doi.org/10.33736/jita.3856.2021.
Full textYong, Jane, Zi Jian Chai, Kah Hao Chin, Christopher Chin Fung Chee, Daniel Soh, Jing Yong Kwong, and Wei Yin Ooi. "An AODV Based Multifactor Authentication Scheme for Wireless Sensor Network." Journal of IT in Asia 9, no. 1 (November 30, 2021): 80–88. http://dx.doi.org/10.33736/jita.3840.2021.
Full textS, Goutham, Soumyashree RK, Prof Feon Jaison, and Dr Mir Aadil. "A Study on Three Step Multifactor Authentication System for Modern Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 10–12. http://dx.doi.org/10.22214/ijraset.2022.40532.
Full textSarvagya, Dr Mrinal. "Multifactor Authentication Assist Crypto Model for Wireless Sensor Networks (MFA-WSNs)." Journal of Advanced Research in Dynamical and Control Systems 12, SP3 (February 28, 2020): 977–90. http://dx.doi.org/10.5373/jardcs/v12sp3/20201342.
Full textLuo, Yurong, Hui Li, Ruhui Ma, and Zhenyang Guo. "A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services." Security and Communication Networks 2021 (April 19, 2021): 1–18. http://dx.doi.org/10.1155/2021/6697155.
Full textGill, Grandon, and Joni Jones. "MULTI-FACTOR AUTHENTICATION AT JAGGED PEAK." Journal of Information Technology Education: Discussion Cases 5 (2016): 05. http://dx.doi.org/10.28945/3597.
Full textZhang, Shuailiang, Xiujuan Du, and Xin Liu. "An Efficient and Provable Multifactor Mutual Authentication Protocol for Multigateway Wireless Sensor Networks." Security and Communication Networks 2021 (August 4, 2021): 1–17. http://dx.doi.org/10.1155/2021/2037188.
Full textSingh, Charanjeet, and Tripat Deep Singh. "A Systemic Review of Various Multifactor Authentication Schemes." International Journal of Computer Sciences and Engineering 7, no. 2 (February 28, 2019): 503–10. http://dx.doi.org/10.26438/ijcse/v7i2.503510.
Full textDiran, Arulogun, Aboaba A. Abdulfattah, Babatope Anthony Oke, and Olaniyi Olayemi. "Multifactor Authentication Technique for Secure Electronic Voting System." Electronic Government, an International Journal 17, no. 1 (2021): 1. http://dx.doi.org/10.1504/eg.2021.10031875.
Full text.M, Satheesh, and Deepika .M. "Implementation of Multifactor Authentication Using Optimistic Fair Exchange." Journal of Ubiquitous Computing and Communication Technologies 2, no. 2 (May 26, 2020): 70–78. http://dx.doi.org/10.36548/jucct.2020.2.002.
Full textRoy, Arunava, and Dipankar Dasgupta. "A fuzzy decision support system for multifactor authentication." Soft Computing 22, no. 12 (May 11, 2017): 3959–81. http://dx.doi.org/10.1007/s00500-017-2607-6.
Full textWang, Ding, Shuhong Hong, and Qingxuan Wang. "Revisiting a Multifactor Authentication Scheme in Industrial IoT." Security and Communication Networks 2021 (June 4, 2021): 1–7. http://dx.doi.org/10.1155/2021/9995832.
Full textKhan, Adnan Shahid, Yasir Javed, Rashad Mahmood Saqib, Zeeshan Ahmad, Johari Abdullah, Kartinah Zen, Irshad Ahmed Abbasi, and Nayeem Ahmad Khan. "Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks." IEEE Access 10 (2022): 31273–88. http://dx.doi.org/10.1109/access.2022.3159686.
Full textKarunakaran, S., N. Arun, M. Arun kumar, and S. S. Aswiin. "Cryptography Based Secured Internet Banking Using Multifactor Authentication." Journal of Cyber Security in Computer System 1, no. 2 (May 23, 2022): 1–8. http://dx.doi.org/10.46610/jcscs.2022.v01i02.001.
Full textZhang, Hui, Yuanyuan Qian, and Qi Jiang. "Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems." Wireless Communications and Mobile Computing 2020 (September 24, 2020): 1–13. http://dx.doi.org/10.1155/2020/8818704.
Full textByun, Jin Wook. "A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function." Security and Communication Networks 2019 (March 4, 2019): 1–15. http://dx.doi.org/10.1155/2019/5935292.
Full textOmotosho, Adebayo, Emmanuel Asani, Paula Fiddi, and Noah Akande. "Image and Password Multifactor Authentication Scheme for e-Voting." Journal of Engineering and Applied Sciences 14, no. 11 (November 30, 2019): 3732–40. http://dx.doi.org/10.36478/jeasci.2019.3732.3740.
Full textMathew, Gloriya, and Shiney Thomas. "A Novel Multifactor Authentication System Ensuring Usability and Security." International Journal of Security, Privacy and Trust Management 2, no. 5 (October 31, 2013): 21–30. http://dx.doi.org/10.5121/ijsptm.2013.2503.
Full textSharma, A., and S. K. Lenka. "Analysis of QKD multifactor authentication in online banking systems." Bulletin of the Polish Academy of Sciences Technical Sciences 63, no. 2 (June 1, 2015): 545–48. http://dx.doi.org/10.1515/bpasts-2015-0062.
Full textMukhin, V. E. "Multifactor authentication as a protection mechanism in computer networks." Cybernetics and Systems Analysis 35, no. 5 (September 1999): 832–35. http://dx.doi.org/10.1007/bf02733418.
Full textOke, B. A., O. M. Olaniyi, A. A. Aboaba, and O. T. Arulogun. "Multifactor authentication technique for a secure electronic voting system." Electronic Government, an International Journal 17, no. 3 (2021): 312. http://dx.doi.org/10.1504/eg.2021.115999.
Full textKorać, Dragan, and Dejan Simić. "Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment." Computers & Security 85 (August 2019): 313–32. http://dx.doi.org/10.1016/j.cose.2019.05.011.
Full textAra, Tabassum, and M. Prabhakar. "Multifactor Authentication and Key Management Protocol for WSN-assisted IoT Communication." Journal of Telecommunications and Information Technology 3 (September 30, 2019): 17–26. http://dx.doi.org/10.26636/jtit.2019.134019.
Full textJovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic, and Dejan Simic. "Extending identity management system with multimodal biometric authentication." Computer Science and Information Systems 13, no. 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.
Full textDíaz, Antonio F., Ilia Blokhin, Mancia Anguita, Julio Ortega, and Juan J. Escobar. "Multiprotocol Authentication Device for HPC and Cloud Environments Based on Elliptic Curve Cryptography." Electronics 9, no. 7 (July 16, 2020): 1148. http://dx.doi.org/10.3390/electronics9071148.
Full textXue, Lingyan, Qinglong Huang, Shuaiqing Zhang, Haiping Huang, and Wenming Wang. "A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT." Security and Communication Networks 2021 (June 22, 2021): 1–15. http://dx.doi.org/10.1155/2021/3300769.
Full textHung, Tran Cong, Nguyen Thanh Tri, and Ho Nhut Minh. "An Enhanced Security for Government Base on Multifactor Biometric Authentication." International journal of Computer Networks & Communications 8, no. 6 (November 30, 2016): 55–72. http://dx.doi.org/10.5121/ijcnc.2016.8605.
Full textO-Genseleke, Macarthy, Osuigbo Ebenezer, and Chioma Chigozie-Okwum. "Implementation of Multifactor based Authentication Scheme for Enhanced ATM Security." International Journal of Computer Applications 181, no. 1 (July 16, 2018): 48–51. http://dx.doi.org/10.5120/ijca2018917400.
Full textPhiri, Jackson, Tie-Jun Zhao, Cong Hui Zhu, and Jameson Mbale. "Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System." International Journal of Computational Intelligence Systems 4, no. 4 (2011): 420. http://dx.doi.org/10.2991/ijcis.2011.4.4.2.
Full textJali, Mohd Zalisham, Steven M. Furnell, and Paul S. Dowland. "Investigating the Viability of Multifactor Graphical Passwords for User Authentication." Information Security Journal: A Global Perspective 23, no. 1-2 (January 2, 2014): 10–21. http://dx.doi.org/10.1080/19393555.2014.891274.
Full textChandrasekar, C., and Manuprasad V. "Multifactor Authentication Scheme for Wireless H.264/AVC Video Streaming." International Journal of Computer Applications 135, no. 7 (February 17, 2016): 18–21. http://dx.doi.org/10.5120/ijca2016908448.
Full textPhiri, Jackson, Tie-Jun Zhao, Cong Hui Zhu, and Jameson Mbale. "Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System." International Journal of Computational Intelligence Systems 4, no. 4 (June 2011): 420–30. http://dx.doi.org/10.1080/18756891.2011.9727801.
Full text