Authentication schemes and methods: A systematic literature review

I Velásquez, A Caro, A Rodríguez - Information and Software Technology, 2018 - Elsevier
Context There is a great variety of techniques for performing authentication, like the use of
text passwords or smart cards. Some techniques combine others into one, which is known …

A comprehensive study on multifactor authentication schemes

K Abhishek, S Roshan, P Kumar, R Ranjan - Advances in Computing and …, 2013 - Springer
In recent years, the development in Information technology has unleashed new challenges
and opportunities for new authentication systems and protocols. Authentication ensures that …

[PDF][PDF] A review of authentication methods

NA Lal, S Prasad, M Farik - Int. J. Sci. Technol. Res, 2016 - researchgate.net
Authentication is process of granting a user access to an information system. There are three
main types of authentication mechanisms–password entry, smart card, and biometric. Each …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

Multi-factor authentication: more secure approach towards authenticating individuals

D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy… - Advances in User …, 2017 - Springer
Multi-Factor authentication (MFA) is a secure process of authentication which requires more
than one authentication technique chosen from independent categories of credentials. Like …

Multi-factor authentication in cyber physical system: A state of art survey

S Ibrokhimov, KL Hui, AA Al-Absi… - 2019 21st international …, 2019 - ieeexplore.ieee.org
Digital Multifactor authentication is one of the best ways to make secure authentication. It
covers many different areas of a Cyber-connected world, including online payments …

Simple two-factor authentication

B Selvarajan - US Patent App. 11/267,148, 2007 - Google Patents
Internet Security is increasingly of concern as more and more cases of identity theft of online
data is reported. Simple login and password authentication for access to sensitive websites …

A comparative usability study of two-factor authentication

E De Cristofaro, H Du, J Freudiger, G Norcie - arXiv preprint arXiv …, 2013 - arxiv.org
Two-factor authentication (2F) aims to enhance resilience of password-based authentication
by requiring users to provide an additional authentication factor, eg, a code generated by a …

[HTML][HTML] Modern authentication methods: A comprehensive survey

M Papathanasaki, L Maglaras… - AI, Computer Science and …, 2022 - intechopen.com
This paper presents a comprehensive investigation of modern authentication schemes. We
start with the importance of authentication methods and the different authentication …

Triggering a request for an authentication

JA McClintock, DE Canavor… - US Patent …, 2016 - Google Patents
BACKGROUND Verifying the identity of a person or group of people, referred to as
authentication, has many uses in the context of computing. People often have multiple user …