Scalable two-factor authentication using historical data

ACF Chan, JW Wong, J Zhou, J Teo - European Symposium on Research …, 2016 - Springer
… deploy two-factor authentication for more sensitive operations… It randomly picks L pieces of
data to form the historical … the computational performance of the novel authentication factor. In …

Securing remote access to information systems of critical infrastructure using two-factor authentication

R Bruzgiene, K Jurgilas - Electronics, 2021 - mdpi.com
… also be used during the two-factor authentication process [10]. … close as possible during the
performance of the experiments, … allowed us to assess whether the predicted cyber-attacks …

Two-Factor Authentication: Selecting and implementing a two-factor authentication method for a digital assessment platform

N Tellini, F Vargas - 2017 - diva-portal.org
… A research that Juniper published in 2015 predicts that … the student’s assessed performance.
Worse, students could … This section introduces the procedures and techniques used

Two-factor authentication scheme for mobile money: A review of threat models and countermeasures

G Ali, M Ally Dida, A Elikana Sam - Future Internet, 2020 - mdpi.com
… -username and SHA-1 hash function to calculate the ticket’s hash value. … authentication
process [95,96]. If an adversary succeeds in accessing the OTP, they may not be able to predict

Two-factor password-authenticated key exchange with end-to-end security

S Jarecki, M Jubur, H Krawczyk, N Saxena… - ACM Transactions on …, 2021 - dl.acm.org
… We present a secure two-factor authentication (TFA) scheme … times as part of the login
procedure to a website we created … ’s PTR response, see below), C picks a CCA-secure public key …

Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… the server as the initiator of the authentication process (party A) and the … SC picks another
seed σ2 and uses it to generate a new … We now evaluate the performance of our lattice-based …

A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography

G Xu, S Qiu, H Ahmad, G Xu, Y Guo, M Zhang, H Xu - Sensors, 2018 - mdpi.com
… Subsequently, U i randomly picks up a number r and … This section analyzes the computational
and security performance of the … methods in this paper can also be used for authentication

2D-2FA: A new dimension in two-factor authentication

M Shirvanian, S Agrawal - Proceedings of the 37th Annual Computer …, 2021 - dl.acm.org
evaluated performance, accuracy, and usability of the system, and compared our methods
with the commonly used … It picks a fresh id from dictid and sends it to C, which is displayed to U…

Two factor authentication protocol for IoT based healthcare monitoring system

AK Agrahari, S Varma, S Venkatesan - Journal of Ambient Intelligence and …, 2023 - Springer
… for the value of {\(\rho _5\)} using his secret key. The two-way verification process illustrates
… In this section, we will illustrate the performance of the proposed protocol for wireless body …

[PDF][PDF] Using the universal two factor authentication method in web applications by software emulated device

P Petrov, P Dimitrov, S Stoev… - International …, 2020 - researchgate.net
… string of characters, the hash value of a file is encrypted. … in the already established methods
for twofactor authentication. The … Based on our experience, the steps for setup SoftU2F-Win …