作者
A Selcuk Uluagac, Wenyi Liu, Raheem Beyah
发表日期
2014/10/29
研讨会论文
2014 IEEE Conference on Communications and Network Security
页码范围
504-505
出版商
IEEE
简介
Continuous re-authentication of users is a must to protect connections with long duration against any malicious activity. Users can be re-authenticated in numerous ways. One popular way is an approach that requires the presentation of two or more authentication factors (i.e., knowledge, possession, identity) called Multi-factor authentication (MFA). Given the market dominance of ubiquitous computing systems (e.g., cloud), MFA systems have become vital in re-authenticating users. Knowledge factor (i.e., passwords) is the most ubiquitous authentication factor; however, forcing a user to re-enter the primary factor, a password, at frequent intervals could significantly lower the usability of the system. Unfortunately, an MFA system with a possession factor (e.g., Security tokens) usually depends on the distribution of some specific device, which is cumbersome and not user-friendly. Similarly, MFA systems with an identity …
引用总数
2015201620172018201920202021202220231121212
学术搜索中的文章
AS Uluagac, W Liu, R Beyah - 2014 IEEE Conference on Communications and …, 2014