S Sanyal, A Tiwari, S Sanyal - Emergent web intelligence: Advanced …, 2010 - Springer
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the …
A Srivastava, A Kumar - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is a modern computing model that refers to interconnected physical devices or IoT devices containing sensors, actuators and networking, so that these …
J Phiri, TJ Zhao, CH Zhu, J Mbale - International Journal of …, 2011 - Taylor & Francis
The recent years have seen a rise in the number of cases of cyber-crime committed through identity theft and fraud. To address this problem, this paper uses adaptive neural-fuzzy …
Objectives. In this study, we investigate if our implementation of two-factor authentication has any advantages to existing ones. Our goal is topresent a secure and user-friendly …
AR Iyanda, EF Mayokun - International Journal of Education and …, 2022 - mecs-press.org
Two-factor authentication is a method of security that adds an extra layer of protection by requiring users to have two different authentication factors to verify identity. In recent years …
This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to …
A Alghamdi - Arab Journal for Scientific Publishing (AJSP), 2021 - ajsp.net
E-health care or Electronic healthcare systems gained high attention in this highly technological and internet world in order to provide high quality healthcare service to the …
M Shirvanian, S Agrawal - Proceedings of the 37th Annual Computer …, 2021 - dl.acm.org
We propose a two-factor authentication (2FA) mechanism called 2D-2FA to address security and usability issues in existing methods. 2D-2FA has three distinguishing features: First …