A physical layer, zero-round-trip-time, multifactor authentication protocol

M Mitev, M Shakiba-Herfeh, A Chorti, M Reed… - IEEE …, 2022 - ieeexplore.ieee.org
… the re-authenticationmulti-factor and privacypreserving authentication protocol entirely
based on PLS techniques. With respect to privacy preservation, similarly to earlier works, we use

Multi-factor physical layer security authentication in short blocklength communication

M Mitev, M Shekiba-Herfeh, A Chorti… - arXiv preprint arXiv …, 2020 - arxiv.org
… a fast, privacy preserving, multi-factor authentication protocol … resumption protocol for
fast re-authentication. All schemes of … In this work, we propose a multi-factor and privacypreserving …

A multifactor multilevel and interaction based (m2i) authentication framework for internet of things (iot) applications

S AlJanah, N Zhang, SW Tay - IEEE Access, 2022 - ieeexplore.ieee.org
multi-factor multi-level and interaction based (M2I) authentication … scheme to reduce the
cost of future re-authentication. … of entity authentication, confidentiality, and resilience against …

A location-based multi-factor authentication scheme for mobile devices

BK Meher, R Amin - International Journal of Ad Hoc and …, 2022 - inderscienceonline.com
In this paper, we propose a robust and user-friendly multi-factor authentication scheme without
using smart card to reduce the operational overhead and hardware cost incurred due to …

[HTML][HTML] A hybrid dynamic encryption scheme for multi-factor verification: a novel paradigm for remote authentication

M Obaidat, J Brown, S Obeidat, M Rawashdeh - Sensors, 2020 - mdpi.com
… ], both because of false positive rates as well as privacy concerns. Additionally, the scale of
… if they cannot send further connections without re-authentication. By comparison, Figure 11 …

Lightweight multifactor authentication scheme for nextgen cellular networks

AS Khan, Y Javed, RM Saqib, Z Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
… a lightweight cryptographic multifactor authentication scheme that … well as the creation of
reauthentication packets. The second highest … Thus, our proposed LEMAP ensures user privacy. …

A Systematic Review on Multi-Factor Authentication Framework.

M Syahreen, N Hafizah, N Maarop… - … Journal of Advanced …, 2024 - search.ebscohost.com
… system and data privacy and confidentiality. Traditional ways of user authentication are
vulnerable to multiple attacks across all platforms. Various studies propose the use of more than …

[HTML][HTML] A systematic survey of multi-factor authentication for cloud infrastructure

SP Otta, S Panda, M Gupta, C Hota - Future Internet, 2023 - mdpi.com
… It shows that user preference correlates with usability and not security and privacy. … responses,
along with the necessary functionalities for the smooth operation of the framework system. …

A secure communication using multifactor authentication and key agreement techniques in internet of medical things for COVID‐19 patients

C Chunka, S Banerjee, SK Gupta - … and Computation: Practice …, 2023 - Wiley Online Library
… Hence, to protect the medical privacy of patients, confidentiality … In 2020, Vinoth et al.,
24 propose a secure multi-factor … defined two techniques for authentication PI and re-authentication

User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
… To further improve the security strength of the two/multi-factor … [60] develop a framework
that can reconstruct a user’s … framework uses computer-vision techniques to track a user’s …