[PDF][PDF] A study on multifactor authentication model using fingerprint hash code, password and OTP

K Prasad, PS Aithal - Int. J. Adv. Trends Eng. Technol, 2018 - academia.edu
By definition, Authentication is using one or multiple mechanisms to show that you are who
you claim to be. As soon as the identity of the human or machine is demonstrated, then …

A multifactor secure authentication system for wireless payment

S Sanyal, A Tiwari, S Sanyal - Emergent web intelligence: Advanced …, 2010 - Springer
Organizations are deploying wireless based online payment applications to expand their
business globally, it increases the growing need of regulatory requirements for the …

A Review on Authentication Protocol and ECC in IOT

A Srivastava, A Kumar - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is a modern computing model that refers to interconnected
physical devices or IoT devices containing sensors, actuators and networking, so that these …

Using artificial intelligence techniques to implement a multifactor authentication system

J Phiri, TJ Zhao, CH Zhu, J Mbale - International Journal of …, 2011 - Taylor & Francis
The recent years have seen a rise in the number of cases of cyber-crime committed through
identity theft and fraud. To address this problem, this paper uses adaptive neural-fuzzy …

A Theoretical Proposal of Two-Factor Authentication in Smartphones

O Persson, E Wermelin - 2017 - diva-portal.org
Objectives. In this study, we investigate if our implementation of two-factor authentication has
any advantages to existing ones. Our goal is topresent a secure and user-friendly …

[引用][C] A robust and scalable four factor authentication architecture to enhance security for mobile online transaction

M Elliot, K Talent - Int. J. Sci. Technol. Res, 2018

[PDF][PDF] Development of two-factor authentication login system using dynamic password with SMS verification

AR Iyanda, EF Mayokun - International Journal of Education and …, 2022 - mecs-press.org
Two-factor authentication is a method of security that adds an extra layer of protection by
requiring users to have two different authentication factors to verify identity. In recent years …

[图书][B] Two-factor authentication

M Stanislav - 2015 - books.google.com
This book discusses the various technical methods by which two-factor authentication is
implemented, security concerns with each type of implementation, and contextual details to …

[PDF][PDF] A verification system for multi-factor authentication for ehealthcare architectures

A Alghamdi - Arab Journal for Scientific Publishing (AJSP), 2021 - ajsp.net
E-health care or Electronic healthcare systems gained high attention in this highly
technological and internet world in order to provide high quality healthcare service to the …

2D-2FA: A new dimension in two-factor authentication

M Shirvanian, S Agrawal - Proceedings of the 37th Annual Computer …, 2021 - dl.acm.org
We propose a two-factor authentication (2FA) mechanism called 2D-2FA to address security
and usability issues in existing methods. 2D-2FA has three distinguishing features: First …