Статті в журналах з теми "Multifactor authentication"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Multifactor authentication.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Multifactor authentication".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Kumar, Devender, and Vikram Singh. "Enhanced Multifactor Authentication Scheme." International Journal of Engineering Trends and Technology 52, no. 2 (October 25, 2017): 109–14. http://dx.doi.org/10.14445/22315381/ijett-v52p217.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Deep, Gaurav, Paramroop Kaur, and Rajni Mohana. "Multifactor Authentication for Hospital Inventory access in Virtual Private Cloud." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 47. http://dx.doi.org/10.14419/ijet.v7i4.12.20991.

Повний текст джерела
Анотація:
In recent times, cloud computing has influenced every sector of life, from managing user database online on the cloud to access it on the cloud makes it more flexible to use. Cloud computing has its own security issues like privacy, integrity, confidentiality and authentication. In order to access data on the cloud Authentication majorly plays a very important role. This paper presents a secure multifactor authentication that can be used for Hospital Inventory access in Virtual Private Cloud. Virtual Private cloud is having the benefit of localization as all the data of cloud are accessible within the organization. To secure Hospital Inventory access in Virtual Private Cloud this paper proposes multifactor authentication technique using Biometric, MAC address via payload .The proposed a multifactor authentication protocol which is also validated by using a validation tool Scyther. The outcomes indicate that the proposed multifactor authentication is a robust technique.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Millán, María S., Elisabet Pérez-Cabré, and Bahram Javidi. "Multifactor authentication reinforces optical security." Optics Letters 31, no. 6 (March 15, 2006): 721. http://dx.doi.org/10.1364/ol.31.000721.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Song, Jian, Guang-song Li, Bo-ru Xu, and Chuan-gui Ma. "A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service." Security and Communication Networks 2018 (November 19, 2018): 1–13. http://dx.doi.org/10.1155/2018/5432960.

Повний текст джерела
Анотація:
Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentication protocols taking advantage of smart card, user’s password, and biometric, are more secure than password-based single-factor authentication protocols which are widely used in practice. However, most of the multiserver authentication protocols may have weak points, such as smart card loss attack, man-in-the-middle attack, anonymity, and high computation cost of authentication center. In order to overcome the above weaknesses, we propose a novel multiserver multifactor authentication protocol based on the Kerberos protocol using the extended Chebyshev chaotic mapping as a cryptographic algorithm. The proposed protocol achieves anonymity without sharing secret keys in advance and needs the user to register with the authentication center only once. Finally, we prove the security of the new protocol with BAN logic and compare it with other multifactor authentication protocols for multiserver environment. The results show that our proposed protocol is more secure and efficient and better for practical application.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mahnken, Scott. "Today's authentication options: the need for adaptive multifactor authentication." Biometric Technology Today 2014, no. 7 (July 2014): 8–10. http://dx.doi.org/10.1016/s0969-4765(14)70126-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Reno, Jim. "Multifactor Authentication: Its Time Has Come." Technology Innovation Management Review 3, no. 8 (August 28, 2013): 51–58. http://dx.doi.org/10.22215/timreview716.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Reno, Jim. "Multifactor Authentication: Its Time Has Come." Technology Innovation Management Review 3, no. 8 (August 28, 2013): 51–58. http://dx.doi.org/10.22215/timreview/716.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

S.V, Suseenthiraraj, and Vijay Swaminath R. "Multifactor Authentication for ATM Security System." International Innovative Research Journal of Engineering and Technology 5, no. 3 (March 30, 2020): 112–19. http://dx.doi.org/10.32595/iirjet.org/v5i3.2020.124.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Althobaiti, Maha M., and Pam Mayhew. "Assessing Usable Security of Multifactor Authentication." Journal of Internet Technology and Secured Transaction 4, no. 4 (December 1, 2015): 421–26. http://dx.doi.org/10.20533/jitst.2046.3723.2015.0053.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Muriki, Vigneshwar. "Multifactor Authentication in Automated Teller Machine." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1780–83. http://dx.doi.org/10.22214/ijraset.2021.39570.

Повний текст джерела
Анотація:
Abstract: Skimming of card details is the primary problem faced by many people in today’s world. This can be done in many ways. For instance, a thief can insert a small device into the machine and steal the information. When a person swipes or inserts a card, the details will be captured and stored. This problem can be solved using biometrics. Biometrics include fingerprint, iris, face, retina scanning, etc. This paper focused on solving this issue using fingerprint and iris recognition using OpenCV and propose a suitable method for this issue. Fingerprint and iris recognition are performed by identifying the keypoints and descriptors and matching those with the test data. Keywords: Biometrics, Fingerprint recognition, Iris recognition, Scale Invariant Feature Transform, Oriented FAST and Rotated BRIEF, OpenCV
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Dineal Gumis, Myra Annatasha Umang, Travis Iran Money, Zetty Elica Affandi, Siti Najihah Sapuan, Mastura Tony, Mohd Haziq Qayyim Safian, and Nur Huda Hamka. "Biometric Blockchain-based Multifactor Privacy Perserving Authentication Scheme for VANETs." Journal of IT in Asia 9, no. 1 (November 30, 2021): 97–107. http://dx.doi.org/10.33736/jita.3851.2021.

Повний текст джерела
Анотація:
To provide the most suitable or compatible scheme to work against various attack toward vehicular ad hoc networks (VANETs) is very challenging. Not only that the high authentication and communication overhead also became a problem for VANETs. Thus, in this paper we use multifactor authentication that could resist various attack toward VANETs. A biometric blockchain-based multifactor privacy-preserving authentication scheme for VANETs. This scheme is proposed by using a new robust pseudo-identity multifactor VANET scheme based on Physical Unclonable Functions (PUF) and biometric data of the vehicle’s authorized user. To calculate the computational cost and the authentication overhead, we compare three of our computational cost and authentication overhead below. From the complexity analysis this proposed scheme has a lower authentication overhead and offers better security level and a low computational cost can be achieved. From the perspective of future, we hope that the cost that involve in this scheme still can be reduce as we offer a high security level. Not only that, but we also hope that this scheme can be implemented practically.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Han, Ziyi, Li Yang, Shen Wang, Sen Mu, and Qiang Liu. "Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing." Wireless Communications and Mobile Computing 2018 (September 12, 2018): 1–14. http://dx.doi.org/10.1155/2018/9149730.

Повний текст джерела
Анотація:
Because the authentication method based on username-password has the disadvantage of easy disclosure and low reliability and the excess password management degrades the user experience tremendously, the user is eager to get rid of the bond of the password in order to seek a new way of authentication. Therefore, the multifactor biometrics-based user authentication wins the favor of people with advantages of simplicity, convenience, and high reliability. Now the biometrics-based (especially the fingerprint information) authentication technology has been extremely mature, and it is universally applied in the scenario of the mobile payment. Unfortunately, in the existing scheme, biometric information is stored on the server side. As thus, once the server is hacked by attackers to cause the leakage of the fingerprint information, it will take a deadly threat to the user privacy. Aiming at the security problem due to the fingerprint information in the mobile payment environment, we propose a novel multifactor two-server authenticated scheme under mobile cloud computing (MTSAS). In the MTSAS, it divides the authentication method and authentication means; in the meanwhile, the user’s biometric characteristics cannot leave the user device. Thus, MTSAS avoids the fingerprint information disclosure, protects user privacy, and improves the security of the user data. In the same time, considering user actual requirements, different authentication factors depending on the privacy level of authentication are chosen. Security analysis proves that MTSAS has achieved the authentication purpose and met security requirements by the BAN logic. In comparison with other schemes, the result shows that MTSAS not only has the reasonable computational efficiency, but also keeps the superior communication cost.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

LakshmiPraveena, T., V. Ramachandran, and CH Rupa. "Attribute based Multifactor Authentication for Cloud Applications." International Journal of Computer Applications 80, no. 17 (October 18, 2013): 37–40. http://dx.doi.org/10.5120/13971-1474.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Bala, Tirupati, and Surinder Singh. "Implementation of Security System using Multifactor Authentication." International Journal of Computer Applications 156, no. 5 (December 15, 2016): 6–8. http://dx.doi.org/10.5120/ijca2016912427.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Pérez-Cabré, E., E. A. Mohammed, M. S. Millán, and H. L. Saadon. "Photon-counting multifactor optical encryption and authentication." Journal of Optics 17, no. 2 (January 22, 2015): 025706. http://dx.doi.org/10.1088/2040-8978/17/2/025706.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Maciej, Bartlomiejczyk, El Fray Imed, and Miroslaw Kurkowski. "Multifactor Authentication Protocol in a Mobile Environment." IEEE Access 7 (2019): 157185–99. http://dx.doi.org/10.1109/access.2019.2948922.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Fakroon, Moneer, Fayez Gebali, and Mohammad Mamun. "Multifactor authentication scheme using physically unclonable functions." Internet of Things 13 (March 2021): 100343. http://dx.doi.org/10.1016/j.iot.2020.100343.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

DEVI PRIYA, K., and L. SUMALATHA. "TRUSTED HYBRID MULTIFACTOR AUTHENTICATION FOR CLOUD USERS." i-manager’s Journal on Cloud Computing 7, no. 1 (2020): 12. http://dx.doi.org/10.26634/jcc.7.1.16670.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

LIJAU, EMILLI. "MyMaster : A Multifactor Authentication Scheme for Smart Home Device." Journal of IT in Asia 9, no. 1 (November 30, 2021): 89–96. http://dx.doi.org/10.33736/jita.3856.2021.

Повний текст джерела
Анотація:
Smart homes are one of the Internet of Things (IoT) applications most significant to enable people to operate intelligent devices on the Internet in their homes. However, when users can access an intelligent home system remotely, they have major privacy and confidentiality difficulties to overcome. Nothing has been done to improve the safety characteristics of an intelligent home with current research on authentication approaches. For example, to address these issues and to develop a reciprocal tracking authentication system with a critical aspect of a deal, we recommend an Internet based Smart Home System (IFTTT) model. As a controller and a safety guard, an IFTTT-Home Gateway provides a user with remote access to a Smart Home System within their company. The system is designed for mutual authentication with security features such as anonymity and full advance security by using Elliptical Curve Encryption, Nonces, XOR or cryptographic Hash functions. We also incorporate multi factor authentication (MFA) into the model to ensure more security and preventing privacy leakage.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Yong, Jane, Zi Jian Chai, Kah Hao Chin, Christopher Chin Fung Chee, Daniel Soh, Jing Yong Kwong, and Wei Yin Ooi. "An AODV Based Multifactor Authentication Scheme for Wireless Sensor Network." Journal of IT in Asia 9, no. 1 (November 30, 2021): 80–88. http://dx.doi.org/10.33736/jita.3840.2021.

Повний текст джерела
Анотація:
Wireless Sensor Network (WSN) is a type of wireless network that is fast getting a lot of attention in scientific and industrial applications, and it is a network of decentralized autonomous standalone sensor devices. However, WSN is easily prone to malicious attacks as anyone can access the server through the node without a proper security authentication. In this paper, we proposed a secure AODV based multi-factor authentication scheme for WSN to mitigate physical attack, offline guessing attack and replay attack. Our proposed scheme is preferred to keep the scheme lightweight while providing enough security that requires smart card, user identity, password, and OTP. Our proposed scheme has relatively lower computational cost with a total of 10Th than the other compared schemes except for Adil et al.’s scheme. However, we have around 8288 bits of authentication overhead due to the nature of packet and the addition of factors. Hence, our scheme is outperformed from computational cost perspective, but the scheme is slightly higher on authentication overhead perspective. In the future, multiple device authentication, implementation of biometric feature can be added to improve the scheme.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

S, Goutham, Soumyashree RK, Prof Feon Jaison, and Dr Mir Aadil. "A Study on Three Step Multifactor Authentication System for Modern Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 10–12. http://dx.doi.org/10.22214/ijraset.2022.40532.

Повний текст джерела
Анотація:
Abstract: This survey paper reviews all the major factors in validating three-level passwords such as one-factor authentication using passwords and two-factor authentication is not enough to provide better security to the modern digital age with remarkable advances in the field of information technology. Even when single-factor or two-factor authentication was used to secure remote access and the system, hacking tools, were simple computer programs for collecting private keys, as well as private generators have made it difficult to provide security. Security threats based on malware, such as important installed trackers, are always available to improve security risks. This is necessary the use of a safe and easy-to-use object. As a result, Three Level Security is an easy-to-use software. It also proves the use of different techniques used by different authors. Keywords: Three-level authentication, network, security, remote access, two-factor authentication
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Sarvagya, Dr Mrinal. "Multifactor Authentication Assist Crypto Model for Wireless Sensor Networks (MFA-WSNs)." Journal of Advanced Research in Dynamical and Control Systems 12, SP3 (February 28, 2020): 977–90. http://dx.doi.org/10.5373/jardcs/v12sp3/20201342.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Luo, Yurong, Hui Li, Ruhui Ma, and Zhenyang Guo. "A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services." Security and Communication Networks 2021 (April 19, 2021): 1–18. http://dx.doi.org/10.1155/2021/6697155.

Повний текст джерела
Анотація:
The fifth-generation (5G) mobile communication technology has already deployed commercially and become a global research focus. The new features of 5G include unlimited information exchange, a large variety of connections with independent energy, and diversified high transmission rate services. Collective synergy of services is expected to change the way of life and future generations and introduce new converged services to the ICT industry. Different application services have to meet differentiated security demands. From the perspective of security, in order to support the multiservice of 5G services, it is necessary to consider the new security mechanism driven by the service. Based on 5G massive data stream, the 5G system can provide customized real-world services for potential users and reduce the user experience gap in different scenarios. However, 3GPP Extensible Authentication Protocol (EAP), which is the present entity authentication mechanism for the 5G service layer, is only an individual authentication architecture and unable to fulfill the flexible security objectives of differentiated services. In this paper, we present a new hierarchical identity management framework as well as an adaptable and composable three-factor authentication and session key agreement protocol for different applications in 5G multiservice systems. Finally, we propose an authorization process by combining with the proposed three-factor authentication mechanism and Service-Based Architecture (SBA) proposed by the 3GPP committee. The proposed mechanism can concurrently provide diverse identity authentication schemes corresponding to four different security levels by easily splitting or assembling three-factor authentication protocol blocks. The proposed scheme can be simultaneously applied to a variety of applications to improve the efficiency and quality of service and reduce the complexity of the whole 5G multiservice system, instead of designing or adopting several different authentication protocols. The performance evaluation results indicate that the proposed scheme can guarantee the multiple security of the system with ideal efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Gill, Grandon, and Joni Jones. "MULTI-FACTOR AUTHENTICATION AT JAGGED PEAK." Journal of Information Technology Education: Discussion Cases 5 (2016): 05. http://dx.doi.org/10.28945/3597.

Повний текст джерела
Анотація:
A supplier of marketing and logistics web sites has been approached by a customer wanting to incorporate multifactor authentication. What approach should be taken and how should it be configured so as not to disrupt existing customers?
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Zhang, Shuailiang, Xiujuan Du, and Xin Liu. "An Efficient and Provable Multifactor Mutual Authentication Protocol for Multigateway Wireless Sensor Networks." Security and Communication Networks 2021 (August 4, 2021): 1–17. http://dx.doi.org/10.1155/2021/2037188.

Повний текст джерела
Анотація:
As the most popular way of communication technology at the moment, wireless sensor networks have been widely concerned by academia and industry and plays an important role in military, agriculture, medicine, and other fields. Identity authentication offers the first line of defence to ensure the security communication of wireless sensor networks. Since the sensor nodes are resource-limited in the wireless networks, how to design an efficient and secure protocol is extremely significant. The current authentication protocols have the problem that the sensor nodes need to execute heavy calculation and communication consumption during the authentication process and cannot resist node capture attack, and the protocols also cannot provide perfect forward and backward security and cannot resist replay attack. Multifactor identity authentication protocols can provide a higher rank of security than single-factor and two-factor identity authentication protocols. The multigateway wireless sensor networks’ structure can provide a larger communication coverage area than the single-gateway network structure, so it has become the focus of recent studies. Therefore, we design a novel multifactor authentication protocol for multigateway wireless sensor networks, which only apply the lightweight hash function and are given biometric information to achieve a higher level of security and efficiency and a larger communication coverage area. We separately apply BAN logic, random oracle model, and AVISPA tool to validate the security of our authentication protocol in Case 1 and Case 2. We put forward sixteen evaluation criteria to comprehensively evaluate our authentication protocol. Compared with the related authentication protocols, our authentication protocol is able to achieve higher security and efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Singh, Charanjeet, and Tripat Deep Singh. "A Systemic Review of Various Multifactor Authentication Schemes." International Journal of Computer Sciences and Engineering 7, no. 2 (February 28, 2019): 503–10. http://dx.doi.org/10.26438/ijcse/v7i2.503510.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Diran, Arulogun, Aboaba A. Abdulfattah, Babatope Anthony Oke, and Olaniyi Olayemi. "Multifactor Authentication Technique for Secure Electronic Voting System." Electronic Government, an International Journal 17, no. 1 (2021): 1. http://dx.doi.org/10.1504/eg.2021.10031875.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

.M, Satheesh, and Deepika .M. "Implementation of Multifactor Authentication Using Optimistic Fair Exchange." Journal of Ubiquitous Computing and Communication Technologies 2, no. 2 (May 26, 2020): 70–78. http://dx.doi.org/10.36548/jucct.2020.2.002.

Повний текст джерела
Анотація:
In this work, two participants fairly send or receive things through the aid of intermediate who is only engaged if required. An up-to-date accepted necessity is with the aim of involving third party in the trade should be transparent, to save from privacy and evade terrible publicity. Together, a dishonest intermediate will negotiate the fairness of the trade and so the intermediate should be liable in case of any behavioural changes. Optimistic fair exchange (OFE) is one of the classical protocols to assure fairness of indulgence for a party. This exchange can be done by means of an arbitrator. The most important aspect of OFE is to describe security models so as to capture real-time attacks and design schemes secure in practical models. Signaller is confirmed with the data to send the correct person to address that to make sure it is. Since then the SMS has gone through to achieve that can hold the path to the right to see which if any is the fact that to ensure there is. After the signature is created by creating it to be able to well take care of it and then to the right of the person to pay off that is sure to make it. In this project, to avoid the third party attack (hacking) and unauthorized person access the particular important data. The data should be transmitted in sender to receiver that receiver only have a correct data without any data losses, protect a data security in cyber-attacks. A signature may be digitally and OFE design for the exchanged item have trade-off between transparency and accountability.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Roy, Arunava, and Dipankar Dasgupta. "A fuzzy decision support system for multifactor authentication." Soft Computing 22, no. 12 (May 11, 2017): 3959–81. http://dx.doi.org/10.1007/s00500-017-2607-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Wang, Ding, Shuhong Hong, and Qingxuan Wang. "Revisiting a Multifactor Authentication Scheme in Industrial IoT." Security and Communication Networks 2021 (June 4, 2021): 1–7. http://dx.doi.org/10.1155/2021/9995832.

Повний текст джерела
Анотація:
Nowadays, as one of the key applications of Internet of Things, Industry IoT (IIoT) has recently received significant attention and has facilitated our life. In IIoT environments, an amount of data generally requires to be transmitted between the user and sensing devices in an open channel. In order to ensure safe transmission of these data, it is necessary for the user and sensing devices to authenticate each other and establish a secure channel between them. Recently, a multifactor authenticated key agreement scheme for IIoT was proposed, which aims to tackle this problem and provide solutions for user multiple sensing devices’ access. This work claims that the proposed scheme is secure against vario us attacks and has less communication and computational costs than other existing related schemes. Unfortunately, we find that this scheme cannot resist smart card attack and sensing device capture attack. Furthermore, we show that this scheme fails to provide forward secrecy, which is essential for a secure multifactor authentication scheme.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Khan, Adnan Shahid, Yasir Javed, Rashad Mahmood Saqib, Zeeshan Ahmad, Johari Abdullah, Kartinah Zen, Irshad Ahmed Abbasi, and Nayeem Ahmad Khan. "Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks." IEEE Access 10 (2022): 31273–88. http://dx.doi.org/10.1109/access.2022.3159686.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Karunakaran, S., N. Arun, M. Arun kumar, and S. S. Aswiin. "Cryptography Based Secured Internet Banking Using Multifactor Authentication." Journal of Cyber Security in Computer System 1, no. 2 (May 23, 2022): 1–8. http://dx.doi.org/10.46610/jcscs.2022.v01i02.001.

Повний текст джерела
Анотація:
The progression in the innovation has prompted presentation of numerous famous Internet applications. Portable Banking additionally called as e-banking is one such imperative application which significantly affects our advanced life. Despite the fact that banks firmly urge their clients to do online exchanges and promote it as an extremely free from even a hint of harm method of executing, truly there is a tremendous gamble related. The consistent development of versatile financial application carries with it a few security issues and inflated cost of carrying out higher security frameworks for clients and banks. Versatile financial framework might be compromised in a wide assortment of ways like utilizing Trojan pony, botnets, Phishing and so forth. In spite of the fact that multifaceted confirmation plans exist to check the realness of the client, the disadvantages with these plans is that they work at exchange level as opposed to at the validation level. This clears way for alleged for man in the center assault between the client and security instruments of programs, cell phones and so on. With versatile financial security turning into a basic necessity one requirements to see as better usable and useful arrangement in light of exchange cum verification level. An endeavor has been made in this work to propose a confirmation that improves the security of the internet banking frameworks .We propose the Hybrid one time secret phrase utilizing arbitrary OTP SHA 256 bit.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Zhang, Hui, Yuanyuan Qian, and Qi Jiang. "Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems." Wireless Communications and Mobile Computing 2020 (September 24, 2020): 1–13. http://dx.doi.org/10.1155/2020/8818704.

Повний текст джерела
Анотація:
Wearable health monitoring systems (WHMSs) have become the most effective and practical solutions to provide users with low-cost, noninvasive, long-term continuous health monitoring. Authentication is one of the key means to ensure physiological information security and privacy. Although numerous authentication protocols have been proposed, few of them cater to crossdomain WHMSs. In this paper, we present an efficient and provably secure crossdomain multifactor authentication protocol for WHMSs. First, we propose a ticket-based authentication model for multidomain WHMSs. Specifically, a mobile device of one domain can request a ticket from the cloud server of another domain with which wearable devices are registered and remotely access the wearable devices with the ticket. Secondly, we propose a crossdomain three-factor authentication scheme based on the above model. Only a doctor who can present all three factors can request a legitimate ticket and use it to access the wearable devices. Finally, a comprehensive security analysis of the proposed scheme is carried out. In particular, we give a provable security analysis in the random oracle model. The comparisons of security and efficiency with the related schemes demonstrate that the proposed scheme is secure and practical.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Byun, Jin Wook. "A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function." Security and Communication Networks 2019 (March 4, 2019): 1–15. http://dx.doi.org/10.1155/2019/5935292.

Повний текст джерела
Анотація:
We study how to generally construct a PUF-based multifactor authenticated key exchange (MAKE) protocol from any secure password-based authenticated key exchange protocol. We newly consider a new setting in which a user holding a PUF-embedded device desires to perform an authenticate key exchange through multifactor authentication factors (password, biometrics, secret). Our construction is the first PUF-based general MAKE construction. By applying a PUF in a device, our MAKE construction is still secure even if all authentication factors are totally compromised. Our construction is the first PUF-based generic MAKE protocol requiring additional three communication flows without any public key based primitives such as signature.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Omotosho, Adebayo, Emmanuel Asani, Paula Fiddi, and Noah Akande. "Image and Password Multifactor Authentication Scheme for e-Voting." Journal of Engineering and Applied Sciences 14, no. 11 (November 30, 2019): 3732–40. http://dx.doi.org/10.36478/jeasci.2019.3732.3740.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Mathew, Gloriya, and Shiney Thomas. "A Novel Multifactor Authentication System Ensuring Usability and Security." International Journal of Security, Privacy and Trust Management 2, no. 5 (October 31, 2013): 21–30. http://dx.doi.org/10.5121/ijsptm.2013.2503.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Sharma, A., and S. K. Lenka. "Analysis of QKD multifactor authentication in online banking systems." Bulletin of the Polish Academy of Sciences Technical Sciences 63, no. 2 (June 1, 2015): 545–48. http://dx.doi.org/10.1515/bpasts-2015-0062.

Повний текст джерела
Анотація:
Abstract In the present scenario internet usage and the online banking sectors are experiencing spectacular growth. The Internet is the fastest growing banking channel today, both in the fields of corporate and retail banking. Banks prefer their customers to use the online banking facility as it reduces their cost, primarily through labour costs. The online banking system addresses several emerging trends: customers’ demand for anytime, anywhere service, product time-to-market imperatives and increasingly complex back-office integration challenges. Online fraud has become major source of revenue for criminals all over the globe. The challenges that oppose online banking are the concerns of security and privacy of information. This has made detecting and preventing these activities a top priority for every major bank. The use of single-factor authentication, such as a user name and the password, has been inadequate for guarding against account fraud and identity theft, in sensitive online banking systems. In this paper we are going to analyze the QKD multifactor authentication in online banking systems
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Mukhin, V. E. "Multifactor authentication as a protection mechanism in computer networks." Cybernetics and Systems Analysis 35, no. 5 (September 1999): 832–35. http://dx.doi.org/10.1007/bf02733418.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Oke, B. A., O. M. Olaniyi, A. A. Aboaba, and O. T. Arulogun. "Multifactor authentication technique for a secure electronic voting system." Electronic Government, an International Journal 17, no. 3 (2021): 312. http://dx.doi.org/10.1504/eg.2021.115999.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Korać, Dragan, and Dejan Simić. "Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment." Computers & Security 85 (August 2019): 313–32. http://dx.doi.org/10.1016/j.cose.2019.05.011.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Ara, Tabassum, and M. Prabhakar. "Multifactor Authentication and Key Management Protocol for WSN-assisted IoT Communication." Journal of Telecommunications and Information Technology 3 (September 30, 2019): 17–26. http://dx.doi.org/10.26636/jtit.2019.134019.

Повний текст джерела
Анотація:
In this paper a novel multi-factor authentication protocol for IoT applications, relying on enhanced Rabinassisted elliptic curve cryptography, biometric features and time stamping methods, is developed. Furthermore, a fuzzy verification algorithm has been developed to perform receiverlevel user verification, making computation efficient in terms of computational overhead as well as latency. An NS2 simulation-based performance assessment has revealed that the multifactor authentication and key management models we have proposed are capable of not only avoiding security breaches, such as smart card loss (SCLA) and impersonation attacks, but can also ensure the provision of maximum possible QoS levels by offering higher packet delivery and minimum latency rates.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Jovanovic, Bojan, Ivan Milenkovic, Marija Bogicevic-Sretenovic, and Dejan Simic. "Extending identity management system with multimodal biometric authentication." Computer Science and Information Systems 13, no. 2 (2016): 313–34. http://dx.doi.org/10.2298/csis141030003j.

Повний текст джерела
Анотація:
Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digital identity management and MMBio framework for multimodal biometrics. Proposed system provides multifactor authentication, where MMBio framework is used for handling user biometric data. Developed prototype confirms possible integration of identity management and multimodal biometric systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Díaz, Antonio F., Ilia Blokhin, Mancia Anguita, Julio Ortega, and Juan J. Escobar. "Multiprotocol Authentication Device for HPC and Cloud Environments Based on Elliptic Curve Cryptography." Electronics 9, no. 7 (July 16, 2020): 1148. http://dx.doi.org/10.3390/electronics9071148.

Повний текст джерела
Анотація:
Multifactor authentication is a relevant tool in securing IT infrastructures combining two or more credentials. We can find smartcards and hardware tokens to leverage the authentication process, but they have some limitations. Users connect these devices in the client node to log in or request access to services. Alternatively, if an application wants to use these resources, the code has to be amended with bespoke solutions to provide access. Thanks to advances in system-on-chip devices, we can integrate cryptographically robust, low-cost solutions. In this work, we present an autonomous device that allows multifactor authentication in client–server systems in a transparent way, which facilitates its integration in High-Performance Computing (HPC) and cloud systems, through a generic gateway. The proposed electronic token (eToken), based on the system-on-chip ESP32, provides an extra layer of security based on elliptic curve cryptography. Secure communications between elements use Message Queuing Telemetry Transport (MQTT) to facilitate their interconnection. We have evaluated different types of possible attacks and the impact on communications. The proposed system offers an efficient solution to increase security in access to services and systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Xue, Lingyan, Qinglong Huang, Shuaiqing Zhang, Haiping Huang, and Wenming Wang. "A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT." Security and Communication Networks 2021 (June 22, 2021): 1–15. http://dx.doi.org/10.1155/2021/3300769.

Повний текст джерела
Анотація:
The Internet of Things (IoT) has built an information bridge between people and the objective world, wherein wireless sensor networks (WSNs) are an important driving force. For applications based on WSN, such as environment monitoring, smart healthcare, user legitimacy authentication, and data security, are always worth exploring. In recent years, many multifactor user authentication schemes for WSNs have been proposed using smart cards, passwords, as well as biometric features. Unfortunately, these schemes are revealed to various vulnerabilities (e.g., password guessing attack, impersonation attack, and replay attack) due to nonuniform security evaluation criteria. Wang et al. put forward 12 pieces of widely accepted evaluation criteria by investigating quantities of relevant literature. In this paper, we first propose a lightweight multifactor authentication protocol for multigateway WSNs using hash functions and XOR operations. Further, BAN logic and BPR model are employed to formally prove the correctness and security of the proposed scheme, and the informal analysis with Wang et al.’s criteria also indicates that it can resist well-known attacks. Finally, performance analysis of the compared schemes is given, and the evaluation results show that only the proposed scheme can satisfy all 12 evaluation criteria and keep efficient among these schemes.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Hung, Tran Cong, Nguyen Thanh Tri, and Ho Nhut Minh. "An Enhanced Security for Government Base on Multifactor Biometric Authentication." International journal of Computer Networks & Communications 8, no. 6 (November 30, 2016): 55–72. http://dx.doi.org/10.5121/ijcnc.2016.8605.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

O-Genseleke, Macarthy, Osuigbo Ebenezer, and Chioma Chigozie-Okwum. "Implementation of Multifactor based Authentication Scheme for Enhanced ATM Security." International Journal of Computer Applications 181, no. 1 (July 16, 2018): 48–51. http://dx.doi.org/10.5120/ijca2018917400.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Phiri, Jackson, Tie-Jun Zhao, Cong Hui Zhu, and Jameson Mbale. "Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System." International Journal of Computational Intelligence Systems 4, no. 4 (2011): 420. http://dx.doi.org/10.2991/ijcis.2011.4.4.2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Jali, Mohd Zalisham, Steven M. Furnell, and Paul S. Dowland. "Investigating the Viability of Multifactor Graphical Passwords for User Authentication." Information Security Journal: A Global Perspective 23, no. 1-2 (January 2, 2014): 10–21. http://dx.doi.org/10.1080/19393555.2014.891274.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Chandrasekar, C., and Manuprasad V. "Multifactor Authentication Scheme for Wireless H.264/AVC Video Streaming." International Journal of Computer Applications 135, no. 7 (February 17, 2016): 18–21. http://dx.doi.org/10.5120/ijca2016908448.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Phiri, Jackson, Tie-Jun Zhao, Cong Hui Zhu, and Jameson Mbale. "Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System." International Journal of Computational Intelligence Systems 4, no. 4 (June 2011): 420–30. http://dx.doi.org/10.1080/18756891.2011.9727801.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії