R Bruzgiene, K Jurgilas - Electronics, 2021 - mdpi.com
… also be used during the two-factorauthenticationprocess [10]. … close as possible during the performance of the experiments, … allowed us to assess whether the predicted cyber-attacks …
… A research that Juniper published in 2015 predicts that … the student’s assessed performance. Worse, students could … This section introduces the procedures and techniques used …
… -username and SHA-1 hash function to calculate the ticket’s hash value. … authentication process [95,96]. If an adversary succeeds in accessing the OTP, they may not be able to predict …
… We present a secure two-factorauthentication (TFA) scheme … times as part of the login procedure to a website we created … ’s PTR response, see below), C picks a CCA-secure public key …
Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… the server as the initiator of the authenticationprocess (party A) and the … SC picks another seed σ2 and uses it to generate a new … We now evaluate the performance of our lattice-based …
G Xu, S Qiu, H Ahmad, G Xu, Y Guo, M Zhang, H Xu - Sensors, 2018 - mdpi.com
… Subsequently, U i randomly picks up a number r and … This section analyzes the computational and security performance of the … methods in this paper can also be used for authentication …
M Shirvanian, S Agrawal - Proceedings of the 37th Annual Computer …, 2021 - dl.acm.org
… evaluatedperformance, accuracy, and usability of the system, and compared our methods with the commonly used … It picks a fresh id from dictid and sends it to C, which is displayed to U…
AK Agrahari, S Varma, S Venkatesan - Journal of Ambient Intelligence and …, 2023 - Springer
… for the value of {\(\rho _5\)} using his secret key. The two-way verificationprocess illustrates … In this section, we will illustrate the performance of the proposed protocol for wireless body …
P Petrov, P Dimitrov, S Stoev… - International …, 2020 - researchgate.net
… string of characters, the hash value of a file is encrypted. … in the already established methods for twofactorauthentication. The … Based on our experience, the steps for setup SoftU2F-Win …