Survey on usable and secure two-factor authentication

BS Archana, A Chandrashekar… - 2017 2nd IEEE …, 2017 - ieeexplore.ieee.org
System resources are usually not retrieved through deception by users who are not legal.
This is basically ensured by Authentication. Text password is one of the forms of user …

[PDF][PDF] A systematic literature review of the types of authentication safety practices among internet users

K Kovalan, SZ Omar, L Tang… - International …, 2021 - pdfs.semanticscholar.org
The authentication system is one of the most important methods for maintaining information
security in smart devices. There are many authentication methods, such as password …

A comparative usability study of two-factor authentication

E De Cristofaro, H Du, J Freudiger, G Norcie - arXiv preprint arXiv …, 2013 - arxiv.org
Two-factor authentication (2F) aims to enhance resilience of password-based authentication
by requiring users to provide an additional authentication factor, eg, a code generated by a …

Multi-factor authentication with randomly selected authentication methods with DID on a random terminal

S Kim, HJ Mun, S Hong - Applied Sciences, 2022 - mdpi.com
Background: Information and communication technology development provides services to
various fields. In particular, the development of mobile technology has made ubiquitous …

[PDF][PDF] Current multi-factor of authentication: Approaches, requirements, attacks and challenges

AHY Mohammed, RA Dziyauddin… - International Journal of …, 2023 - eprints.utm.my
Now-a-days, with the rapid and broad emergence of local or remote access to services on
the internet. Authentication represents an important security control requirement and the …

Ts2fa: Trilateration system two factor authentication

AAS AlQahtani, H Alamleh, J Gourd… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor
is something a user knows (password, or phrase), something a user possesses (smart card …

[PDF][PDF] A study on authentication factors in electronic health records

M Jayabalan, T O'Daniel - … and Innovation (e-ISSN: 2600-7304 …, 2019 - jati.sites.apiit.edu.my
Privacy and security are one the major challenge for the healthcare providers to maintain
with increasing security breaches. User authentication is an essential factor to implement in …

ABCD Analysis of Fingerprint Hash Code, Password and OTP based Multifactor Authentication Model

PS Aithal - 2018 - papers.ssrn.com
Authentication is the usage of one or multiple mechanisms to show that who you declare or
claim to be. Authentication ensures that users are granted to some resources or services …

[PDF][PDF] Comparative study of authentication techniques

HZU Khan, H Zahid - International Journal of Video & Image Processing …, 2010 - Citeseer
The Internet has emerged as one of the most convenient and widely used media for
exchanging information. The Internet of today is faced with many challenges. One of the …

[PDF][PDF] Designing of user authentication based on multi-factor authentication on wireless networks

DT Manurung - Jour of Adv Research in Dynamical & Control …, 2020 - researchgate.net
The purpose of Multi-factor Authentication is to create multiple layers of defense and make it
more difficult for unauthorized people to access targets such as physical locations, computer …