… authenticate a user is sometimes related as a strong authentication, but the strength of the authentication … We also elaborate further about their use, limitations and potential benefits, and …
R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
… review of the literature on biometric userauthentication, encompassing an analysis of key … and behavioral traits, assessing their benefits and limitations. We also examine the …
… Userauthentication, ie, a procedure to verify the identity of the user, is essential in the digital … Researchers thus have proposed numerous new mechanisms to authenticate the users in …
… In [44], the authors provided a comprehensive summary of the benefits of phone-based … using the suggested benefits to analyze more approaches to authentication. The benefits in each …
… the basic authentication mechanism for identifying and authorizing legitimate users to computing systems and denying the use by others. It narrates different authentication categories, …
MA Al Kabir, W Elmedany - 2022 4th IEEE Middle East and …, 2022 - ieeexplore.ieee.org
… based authentication still remains as one of the most dominant ways of verifying a user's identity… -factor and adaptive risk-based authentication schemes that have been adopted over the …
… secure and dependable userauthentication mechanisms. … features that a reliable user authentication scheme for WSNs … , node capture attack and user impersonation attack. There is …
H Murray, D Malone - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
… We provide a methodology for organisations to assess which authentication advice to follow, and we provide an assessment of current advice that demonstrates to end-users which …
… We discuss the benefits and drawbacks of using personal data as a source of dynamic … to support userauthentication on a more theoretical level and aim to understand users’ attitudes …