Добірка наукової літератури з теми "Multifactor authentication"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Multifactor authentication".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Multifactor authentication"
Kumar, Devender, and Vikram Singh. "Enhanced Multifactor Authentication Scheme." International Journal of Engineering Trends and Technology 52, no. 2 (October 25, 2017): 109–14. http://dx.doi.org/10.14445/22315381/ijett-v52p217.
Повний текст джерелаDeep, Gaurav, Paramroop Kaur, and Rajni Mohana. "Multifactor Authentication for Hospital Inventory access in Virtual Private Cloud." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 47. http://dx.doi.org/10.14419/ijet.v7i4.12.20991.
Повний текст джерелаMillán, María S., Elisabet Pérez-Cabré, and Bahram Javidi. "Multifactor authentication reinforces optical security." Optics Letters 31, no. 6 (March 15, 2006): 721. http://dx.doi.org/10.1364/ol.31.000721.
Повний текст джерелаSong, Jian, Guang-song Li, Bo-ru Xu, and Chuan-gui Ma. "A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service." Security and Communication Networks 2018 (November 19, 2018): 1–13. http://dx.doi.org/10.1155/2018/5432960.
Повний текст джерелаMahnken, Scott. "Today's authentication options: the need for adaptive multifactor authentication." Biometric Technology Today 2014, no. 7 (July 2014): 8–10. http://dx.doi.org/10.1016/s0969-4765(14)70126-2.
Повний текст джерелаReno, Jim. "Multifactor Authentication: Its Time Has Come." Technology Innovation Management Review 3, no. 8 (August 28, 2013): 51–58. http://dx.doi.org/10.22215/timreview716.
Повний текст джерелаReno, Jim. "Multifactor Authentication: Its Time Has Come." Technology Innovation Management Review 3, no. 8 (August 28, 2013): 51–58. http://dx.doi.org/10.22215/timreview/716.
Повний текст джерелаS.V, Suseenthiraraj, and Vijay Swaminath R. "Multifactor Authentication for ATM Security System." International Innovative Research Journal of Engineering and Technology 5, no. 3 (March 30, 2020): 112–19. http://dx.doi.org/10.32595/iirjet.org/v5i3.2020.124.
Повний текст джерелаAlthobaiti, Maha M., and Pam Mayhew. "Assessing Usable Security of Multifactor Authentication." Journal of Internet Technology and Secured Transaction 4, no. 4 (December 1, 2015): 421–26. http://dx.doi.org/10.20533/jitst.2046.3723.2015.0053.
Повний текст джерелаMuriki, Vigneshwar. "Multifactor Authentication in Automated Teller Machine." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1780–83. http://dx.doi.org/10.22214/ijraset.2021.39570.
Повний текст джерелаДисертації з теми "Multifactor authentication"
Althobaiti, Maha. "Assessing usable security of multifactor authentication." Thesis, University of East Anglia, 2016. https://ueaeprints.uea.ac.uk/61540/.
Повний текст джерелаBorgman, Isabelle. "Scan me – Ökad säkerhet med multifactor authentication : En undersökning om effekten vid ökad säkerhet i digitala identifierare." Thesis, Linnéuniversitetet, Institutionen för medieteknik (ME), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-54084.
Повний текст джерелаThe following bachelor thesis examines an application based on three factors: security, usability and functionality. The work presents a prototype of an identification application that uses QR codes to identify a person. The identification process is supposed to work in eg a line to a pub. The QR-code is in the guest's mobile and the doorman uses the prototype, which this thesis presents, on a tablet or smartphone and scan the guest's QR code. The aim is to investigate how the usability and functionality is affected in an application when it is added a factor that increases the apps security. This is examined through a user test where 8 test subjects will test the developed prototype and provide feedback both from a guest and a doormans perspective. The results show that the usability decreases while the security increases. The identification with the QR reader takes about 4 seconds longer than it does to identify with the usual method, i.e. comparing an ID card with a membership card. The functionality in the system increases because we add the functionality to scan a QR-code and compare it's information with a database. The prototype that has been developed in this bachelor thesis has development potential and can be used in other contexts and in other environments; for example the prototype would work equally well in a business context in which the business can replace their membership card with a QR code and a reader to give their customers benefits.
Dlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.
Повний текст джерелаThesis (PhD)--University of Pretoria, 2020.
Computer Science
PhD
Unrestricted
Лобанов, Сергій Олександрович. "Удосконалені методи автентифікації в системах обміну миттєвими повідомленнями". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/27191.
Повний текст джерелаThe work includes 104 pages, 2 images, 16 links and 25 tables. The object of research are user authentication and their messages authentication based on extracted behavioral patterns during communication at instant messaging services. The subject of this qualification is multifactor authentication methods and improvement approaches for machine learning classification methods of user messages authentication by analyzing the characteristics of dialogue in order to use the key features of dialogue in the applications of instant messaging. The aim of this qualification work is improvement of security of instant messaging systems by building of mechanism with reliable methods of user authentication and improved messages authentication methods for prevention of information leakage based on extracted behavioral patterns of users during communication at instant messaging services. Methods of research are analysis and comparison of multifactor authentication methods for users and messages based on user behavioral patterns extraction by analyzing of user dialogues during messaging, building of mechanism for user and message authentication. The result of the work is a system with the multifactor authentication and improved messages authentication information leakage prevention during instant messaging.
Neves, Pedro Fonseca das. "Multifactor authentication using smartphone as token." Master's thesis, 2015. http://hdl.handle.net/10071/11150.
Повний текст джерелаA biometria é uma área de estudo que observou desenvolvimentos relevantes na última década. Em específico, a biometria baseada no eletrocardiograma (ECG) é atualmente considerada uma fonte de identificação confiável. Um dos maiores avanços nesta tecnologia consiste na evolução da autenticação off-the-person, que permite realizar a aquisição de sinal de forma não intrusiva usando as mãos do utilizador. Contudo, a identificação através deste método ainda apresenta uma performance relativamente baixa quando usada uma base de dados de dimensão acima das dezenas. Nesta dissertação sugerimos usar a autenticação ECG associada a um telemóvel a funcionar como security token com o objectivo de melhorar a performance e diminuir o tempo necessário para o reconhecimento. Para isso, desenvolvemos a nossa solução usando a tecnologia Bluetooth (BL) clássico, mas também Bluetooth Low Energy (BLE) para preservar a bateria do telemóvel; além disto, desenvolvemos as aplicações em Windows Phone e também Android, dadas as limitações que encontrámos. Para criar um ambiente mais versátil e móvel, usámos a recente plataforma Intel Edison. Os resultados obtidos provam que a nossa solução é viável. Executámos uma série de testes, nos quais observámos uma melhoria nos tempos associados à autenticação quando comparados com o cenário clássico de identificação por ECG. Adicionalmente, a performance do ECG no que diz respeito ao número de falsos-negativos e falsos-positivos apresentou também melhoria.
Книги з теми "Multifactor authentication"
National Institute of Standards and Technology (U.S.) and RAND Homeland Security and Defense Center, eds. Influences on the adoption of multifactor authentication. Santa Monica: RAND, 2011.
Знайти повний текст джерелаLibicki, Martin C. Influences on the adoption of multifactor authentication. Santa Monica: RAND, 2011.
Знайти повний текст джерелаHacking Multifactor Authentication. Wiley & Sons, Limited, John, 2020.
Знайти повний текст джерелаЧастини книг з теми "Multifactor authentication"
Sahay, Rahul. "Multifactor Authentication." In Microsoft Azure Architect Technologies Study Companion, 561–84. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6200-9_15.
Повний текст джерелаLikitha, Soorea, and R. Saravanan. "Cryptanalysis of a Multifactor Authentication Protocol." In Advances in Intelligent Systems and Computing, 35–42. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8639-7_4.
Повний текст джерелаZiyad, Shabana, and A. Kannammal. "A Multifactor Biometric Authentication for the Cloud." In Advances in Intelligent Systems and Computing, 395–403. New Delhi: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-1680-3_43.
Повний текст джерелаAbhishek, Kumar, Sahana Roshan, Prabhat Kumar, and Rajeev Ranjan. "A Comprehensive Study on Multifactor Authentication Schemes." In Advances in Computing and Information Technology, 561–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31552-7_57.
Повний текст джерелаShashikumar, Spandana, and B. S. Manohar. "Multifactor Authentication for Smart Grid Cyber Security." In Lecture Notes in Networks and Systems, 537–47. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0980-0_52.
Повний текст джерелаMore, Dhanshree, Bhushan Deore, and Surendra Bhosale. "Multifactor Biometric Authentication for Cloud Computing Security." In Proceedings of International Conference on Communication and Artificial Intelligence, 389–97. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0976-4_32.
Повний текст джерелаKarpagam, G. R., A. Mukeshpandi, K. S. Sanjay Krishnan, and S. Vanjinathan. "AI Powered Partially Parallelized Scheme for Multifactor Authentication." In Smart Techniques for a Smarter Planet, 91–115. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03131-2_6.
Повний текст джерелаDiaz-Tellez, Yair H., Eliane L. Bodanese, Theo Dimitrakos, and Michael Turner. "Context-Aware Multifactor Authentication Based on Dynamic Pin." In ICT Systems Security and Privacy Protection, 330–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_27.
Повний текст джерелаSanyal, Sugata, Ayu Tiwari, and Sudip Sanyal. "A Multifactor Secure Authentication System for Wireless Payment." In Emergent Web Intelligence: Advanced Information Retrieval, 341–69. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-074-8_13.
Повний текст джерелаBhalla, Rachit, and N. Jeyanthi. "M2U2: Multifactor Mobile Based Unique User Authentication Mechanism." In Advances in Intelligent Systems and Computing, 455–64. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16657-1_42.
Повний текст джерелаТези доповідей конференцій з теми "Multifactor authentication"
BARBU, Ionuţ-Daniel, and Gabriel PETRICĂ. "Multifactor Authentication." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2014. http://dx.doi.org/10.19107/cybercon.2014.01.
Повний текст джерелаPavlovski, Christopher, Claudia Warwar, Brett Paskin, and Gary Chan. "Unified framework for multifactor authentication." In 2015 22nd International Conference on Telecommunications (ICT). IEEE, 2015. http://dx.doi.org/10.1109/ict.2015.7124684.
Повний текст джерелаChudá, Daniela, and Michal Ďurfina. "Multifactor authentication based on keystroke dynamics." In the International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1731740.1731836.
Повний текст джерелаJoshi, Ashish, Sonu Kumar, and R. H. Goudar. "A More Multifactor Secure Authentication Scheme Based on Graphical Authentication." In 2012 International Conference on Advances in Computing and Communications (ICACC). IEEE, 2012. http://dx.doi.org/10.1109/icacc.2012.43.
Повний текст джерелаUtomo, Subroto Budhi, and Bayu Hendradjaya. "Multifactor Authentication on Mobile Secure Attendance System." In 2018 International Conference on ICT for Smart Society (ICISS). IEEE, 2018. http://dx.doi.org/10.1109/ictss.2018.8550017.
Повний текст джерелаNjaka, Adokiye Charles, Na Li, and Lin Li. "Voice Controlled Smart Mirror with Multifactor Authentication." In 2018 IEEE International Smart Cities Conference (ISC2). IEEE, 2018. http://dx.doi.org/10.1109/isc2.2018.8656932.
Повний текст джерелаAdukkathayar, Anirudhan, Gokul S. Krishnan, and Rajashree Chinchole. "Secure multifactor authentication payment system using NFC." In 2015 10th International Conference on Computer Science & Education (ICCSE). IEEE, 2015. http://dx.doi.org/10.1109/iccse.2015.7250269.
Повний текст джерелаMillán, María S., Elisabet Pérez-Cabré, and Bahram Javidi. "High secure authentication by optical multifactor ID tags." In Optics/Photonics in Security and Defence, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.689886.
Повний текст джерелаOke, B. A., O. M. Olaniyi, A. A. Aboaba, and O. T. Arulogun. "Developing multifactor authentication technique for secure electronic voting system." In 2017 International Conference on Computing Networking and Informatics (ICCNI). IEEE, 2017. http://dx.doi.org/10.1109/iccni.2017.8123773.
Повний текст джерелаKuseler, Torben, Ihsan A. Lami, and Hisham Al-Assam. "Location-assured, multifactor authentication on smartphones via LTE communication." In SPIE Defense, Security, and Sensing, edited by Sos S. Agaian, Sabah A. Jassim, and Eliza Y. Du. SPIE, 2013. http://dx.doi.org/10.1117/12.2018027.
Повний текст джерелаЗвіти організацій з теми "Multifactor authentication"
Newhouse, William. Multifactor authentication for e-commerce. Gaithersburg, MD: National Institute of Standards and Technology, July 2019. http://dx.doi.org/10.6028/nist.sp.1800-17.
Повний текст джерела