[PDF][PDF] SecAuthn: provably secure multi-factor authentication for the cloud computing systems

S Nagaraju, L Parthiban - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Cloud computing is an advanced resource pooling framework which delivers an economical
and more reliable Information and Communications Technology (ICT) solutions to the …

2FMA-NetBank: A proposed two factor and mutual authentication scheme for efficient and secure internet banking

A Pratama, E Prima - 2016 8th International Conference on …, 2016 - ieeexplore.ieee.org
Nowadays, the banking industries need to enhance their services by utilizing ICT. Since the
internet became a most influential technology for all aspects of life, bank transforms their …

Enhanced cryptocurrency security by time-based token multi-factor authentication algorithm

KA Taher, T Nahar, SA Hossain - … International Conference on …, 2019 - ieeexplore.ieee.org
A noble multi-factor authentication (MFA) algorithm is developed for the security
enhancement of the Cryptocurrency (CR). The main goal of MFA is to set up extra layer of …

[PDF][PDF] CCTV-based multi-factor authentication system

BW Kwon, PK Sharma, JH Park - Journal of Information Processing …, 2019 - koreascience.kr
Many security systems rely solely on solutions based on Artificial Intelligence, which are
weak in nature. These security solutions can be easily manipulated by malicious users who …

Formal analysis of mobile multi-factor authentication with single sign-on login

G Sciarretta, R Carbone, S Ranise… - ACM Transactions on …, 2020 - dl.acm.org
Over the last few years, there has been an almost exponential increase in the number of
mobile applications that deal with sensitive data, such as applications for e-commerce or …

[HTML][HTML] Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes

K Hussain, NZ Jhanjhi, H Mati-ur-Rahman… - Journal of King Saud …, 2021 - Elsevier
The importance of smart card based two factor authentication can be gauged by the fact that
many schemes have been proposed so far yet none of them used a systematic framework to …

Reliable biometric authentication with privacy protection

SB Sharma, I Dhall, SR Nayak, P Chatterjee - … in Communication, Devices …, 2022 - Springer
Objectives To study and compare different types of biometric systems and to obtain the result
for the same, this paper has discussed the need of biometrics, ways of performing it and the …