Multifactor authentication protocol in a mobile environment

M Bartłomiejczyk, M Kurkowski - IEEE Access, 2019 - ieeexplore.ieee.org
… implementations of multifactor authentication and choose the best authentication factor from
each category to use in a mobile environment. The result is an authentication protocol that …

Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment

D Korać, D Simić - Computers & Security, 2019 - Elsevier
… the MFA in a mobile environment. Accordingly, this paper is developed on three fundamental
principles: a review and a description of contemporary mobile authentication methods, their …

Two factor vs multi-factor, an authentication battle in mobile cloud computing environments

JK Mohsin, L Han, M Hammoudeh… - Proceedings of the …, 2017 - dl.acm.org
Mobile devices offer a convenient way of accessing our digital lives and many of those devices
hold sensitive data that needs protecting. Mobile and wireless communications networks, …

User authentication protocol based on the location factor for a mobile environment

M Bartłomiejczyk, I El Fray, M Kurkowski… - IEEE …, 2022 - ieeexplore.ieee.org
multifactor authentication protocol in a mobile environment and can be implemented in
the next stage of authentication. Alternatively, the proposed protocol can be used as an …

[PDF][PDF] Multi factor authentication using mobile phones

F Aloul, S Zahidi, W El-Hajj - International Journal of Mathematics …, 2009 - researchgate.net
This paper describes a method of implementing two factor authentication using mobile phones.
The proposed method guarantees that authenticating to services, such as online banking …

Context-aware multifactor authentication survey

E Huseynov, JM Seigneur - Computer and Information Security Handbook, 2017 - Elsevier
… Classic Approach to Multifactor Authentication Multifactor authentication using carried devices
(a hardware token or an application on a mobile device) as a context was among the first …

Dynamic multi-factor authentication for smartphone

A Yohan, NW Lo, HR Lie - … on Personal, Indoor, and Mobile …, 2016 - ieeexplore.ieee.org
… The proposed multi-factor authentication method is able to dynamically adjust its complexity
… smartphone’s environment. By detecting signals from the user’s environment, our proposed …

An adaptive approach towards the selection of multi-factor authentication

AK Nag, A Roy, D Dasgupta - 2015 IEEE symposium series on …, 2015 - ieeexplore.ieee.org
… the existing environmental conditions within the selection of … Mobile devices are widely
used to maintain online activities … continuous authentication to the users’ of mobile devices. …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
… It was concluded that the ease of technology utilization and its environmental context play a
… In summary, biometric technology is a prominent direction driven by the mobile device market…

[PDF][PDF] Multi-factor authentication for secured financial transactions in cloud environment

D Prabakaran, S Ramachandran - CMC-Computers, Materials & …, 2022 - cdn.techscience.cn
… This proposed protocol is applicable for mobile devices and employs International Mobile
Subscriber Identity (IMSI) number to provide an individual’s unique identification. Xie et al. [11] …