[PDF][PDF] Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security.

RM Saqib, AS Khan, Y Javed, S Ahmad… - Intelligent Automation …, 2022 - academia.edu
… of research on multi-factor authentication. To achieve … multi-factor authentication evolved
over time? What is the impact and citation structure of the research on multi-factor authentication

A review of multi-factor authentication in the Internet of Healthcare Things

T Suleski, M Ahmed, W Yang, E Wang - Digital health, 2023 - journals.sagepub.com
… artificial intelligence (AI) for smart monitoring systems, 43 it is … of cyber security and how MFA
plays a key role in preventing … TS developed the literature review, discussion, analysis, and …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
… This work provides a detailed analysis of factors that … IT security can reap considerable
benefits for an organization, including enhanced efficiency and compliance plus improved security

Multi-factor authentication in innovative business systems of industrial clusters

A Zaenchkovski, A Lazarev, S Masyutin - … Russian Automation Conference, 2022 - Springer
security of these processes in information space [3]. Most of approaches to information security
… system, which made it possible to perform an analytical open fingerprint comparison with …

[PDF][PDF] MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies.

S Das, B Wang, A Kim, LJ Camp - HICSS, 2020 - academia.edu
… factor analysis along … it as a redundant security measure. As a result, our research identified
a certain group of participants in information security that chose not to enroll in multi-factor

An efficient multi-factor authentication scheme based CNNs for securing ATMs over cognitive-IoT

A Shalaby, R Gad, EED Hemdan… - PeerJ Computer …, 2021 - peerj.com
authentication system for ATMs based on a bank’s mobile application and a visible light
environments-based iris recognition. It uses the deep Convolutional Neural Networksummary of …

[PDF][PDF] Multi-Factor Authentication for Improved Enterprise Resource Planning Systems Security

C Kimani, JI Obuhuma, E Roche - International Journal of Information …, 2023 - academia.edu
analysis established vulnerabilities, information security policies, and user training to be having
a higher impact on system security… His research interest is in the application of intelligent

Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
… Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access … This analysis can help to identify and mitigate any potential …

Challenges of multi-factor authentication for securing advanced IoT applications

A Ometov, V Petrov, S Bezzateev, S Andreev… - … Network, 2019 - ieeexplore.ieee.org
… As can be concluded from our analysis and Table 2, neither … of a certain level of intelligence
when deriving the resulting … of Information Technologies and Information Security, SUAI. …

[PDF][PDF] CCTV-based multi-factor authentication system

BW Kwon, PK Sharma, JH Park - Journal of Information Processing …, 2019 - koreascience.kr
… on Artificial Intelligence, which are weak in nature. These … of the proposed multi-factor
authentication framework. In addition… , we analyze qualitatively the proposed model and compare …