In recent years, the development in Information technology has unleashed new challenges and opportunities for new authentication systems and protocols. Authentication ensures that …
NA Lal, S Prasad, M Farik - Int. J. Sci. Technol. Res, 2016 - researchgate.net
Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms–password entry, smart card, and biometric. Each …
D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password authentication has been a subject of intensive research in the past two decades, and …
D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy… - Advances in User …, 2017 - Springer
Multi-Factor authentication (MFA) is a secure process of authentication which requires more than one authentication technique chosen from independent categories of credentials. Like …
Digital Multifactor authentication is one of the best ways to make secure authentication. It covers many different areas of a Cyber-connected world, including online payments …
B Selvarajan - US Patent App. 11/267,148, 2007 - Google Patents
Internet Security is increasingly of concern as more and more cases of identity theft of online data is reported. Simple login and password authentication for access to sensitive websites …
Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, eg, a code generated by a …
This paper presents a comprehensive investigation of modern authentication schemes. We start with the importance of authentication methods and the different authentication …
JA McClintock, DE Canavor… - US Patent …, 2016 - Google Patents
BACKGROUND Verifying the identity of a person or group of people, referred to as authentication, has many uses in the context of computing. People often have multiple user …