Multi-factor authentication: more secure approach towards authenticating individuals

D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy… - Advances in User …, 2017 - Springer
Multi-Factor authentication (MFA) is a secure process of authentication which requires more
than one authentication technique chosen from independent categories of credentials. Like …

[HTML][HTML] A novel multi-factor authentication algorithm based on image recognition and user established relations

D Carrillo-Torres, JA Pérez-Díaz… - Applied Sciences, 2023 - mdpi.com
Conventional authentication methods, like simple text-based passwords, have shown
vulnerabilities to different types of security attacks. Indeed, 61% of all breaches involve …

[HTML][HTML] Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

A comprehensive study on multifactor authentication schemes

K Abhishek, S Roshan, P Kumar, R Ranjan - Advances in Computing and …, 2013 - Springer
In recent years, the development in Information technology has unleashed new challenges
and opportunities for new authentication systems and protocols. Authentication ensures that …

Multifactor Authentication (MFA) in Network Security: Strengthening Access Controls

M Muxtoriddinov, Z Khudoykulov… - Conference on Digital …, 2023 - fer-teach.uz
Аннотация This article focuses on the importance ofimplementing multifactor authentication
(MFA) as a means to strengthen access controls in network security. It discusses the various …

Multi-factor authentication in cyber physical system: A state of art survey

S Ibrokhimov, KL Hui, AA Al-Absi… - 2019 21st international …, 2019 - ieeexplore.ieee.org
Digital Multifactor authentication is one of the best ways to make secure authentication. It
covers many different areas of a Cyber-connected world, including online payments …

A survey on trends of two-factor authentication

D Tirfe, VK Anand - Contemporary Issues in Communication, Cloud and …, 2022 - Springer
The rapid increase of cybercriminals on identity theft and data breaches due to weak
authentication schemes, user's poor password management experience, and attacks such …

Authentication schemes and methods: A systematic literature review

I Velásquez, A Caro, A Rodríguez - Information and Software Technology, 2018 - Elsevier
Context There is a great variety of techniques for performing authentication, like the use of
text passwords or smart cards. Some techniques combine others into one, which is known …

Triggering a request for an authentication

JA McClintock, DE Canavor… - US Patent …, 2016 - Google Patents
BACKGROUND Verifying the identity of a person or group of people, referred to as
authentication, has many uses in the context of computing. People often have multiple user …

Mobile multi-factor authentication

A Bissada, A Olmsted - 2017 12th International Conference for …, 2017 - ieeexplore.ieee.org
Security has always been an important topic when it comes to the communication of
sensitive data. With hardware advances allowing users the advantage of accessibility used …