SIP issues and challenges-a scalable three factor authentication scheme

SU Jan, F Qayum, A Khan - Mehran University Research Journal …, 2020 - search.informit.org
The SIP (Session Initiation Protocol) is an application and presentation layer signaling
protocol used for initiating, continuing and terminating multimedia session for the end user. It …

Application of multi factor authentication in internet of things domain

U Gupta - arXiv preprint arXiv:1506.03753, 2015 - arxiv.org
Authentication forms the gateway to any secure system. Together with integrity,
confidentiality and authorization it helps in preventing any sort of intrusions into the system …

A novel multi-factor authentication algorithm based on image recognition and user established relations

D Carrillo-Torres, JA Pérez-Díaz… - Applied Sciences, 2023 - mdpi.com
Conventional authentication methods, like simple text-based passwords, have shown
vulnerabilities to different types of security attacks. Indeed, 61% of all breaches involve …

Multi-factor authentication modeling

L Dostálek - 2019 9th International Conference on Advanced …, 2019 - ieeexplore.ieee.org
The work defines a multi-factor authentication model in case the application supports
multiple authentication factors. The aim of this modeling is to find acceptable authentication …

A comprehensive study on multifactor authentication schemes

K Abhishek, S Roshan, P Kumar, R Ranjan - Advances in Computing and …, 2013 - Springer
In recent years, the development in Information technology has unleashed new challenges
and opportunities for new authentication systems and protocols. Authentication ensures that …

Usable security of authentication process: New approach and practical assessment

MM Althobaiti, P Mayhew - 2015 10th International Conference …, 2015 - ieeexplore.ieee.org
Authentication mechanisms are considered the typical method to secure financial websites.
Context authentication has become increasingly important in the arena of online banking …

[PDF][PDF] A method of risk assessment for multi-factor authentication

JJ Kim, SP Hong - Journal of Information Processing Systems, 2011 - koreascience.kr
User authentication refers to user identification based on something a user knows,
something a user has, something a user is or something the user does; it can also take place …

Multi-factor authentication

S Boonkrong, S Boonkrong - Authentication and Access Control: Practical …, 2021 - Springer
Abstract Today, there are over 3.5 billion people online and have access to many online
services such as banking, shopping, student records, and social media. In order to access …

A secure multi factor user authentication framework for electronic payment system

MA Hassan, Z Shukur - 2021 3rd International Cyber …, 2021 - ieeexplore.ieee.org
In the growth of financial industries, the electronic payments system is a newest topic, which
is to be replaced in the near future by electronic or online transaction. With the advancement …

[PDF][PDF] Multi-dimensional and multi-level authentication techniques

T Naik, S Koul - International Journal of Computer Applications, 2013 - Citeseer
Current authentication schemes suffer from many weaknesses. Textual passwords are
widely used; however users tend to choose meaningful words from dictionaries. This makes …