D Carrillo-Torres, JA Pérez-Díaz… - Applied Sciences, 2023 - mdpi.com
Conventional authentication methods, like simple text-based passwords, have shown vulnerabilities to different types of security attacks. Indeed, 61% of all breaches involve …
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a …
In recent years, the development in Information technology has unleashed new challenges and opportunities for new authentication systems and protocols. Authentication ensures that …
Аннотация This article focuses on the importance ofimplementing multifactor authentication (MFA) as a means to strengthen access controls in network security. It discusses the various …
Digital Multifactor authentication is one of the best ways to make secure authentication. It covers many different areas of a Cyber-connected world, including online payments …
D Tirfe, VK Anand - Contemporary Issues in Communication, Cloud and …, 2022 - Springer
The rapid increase of cybercriminals on identity theft and data breaches due to weak authentication schemes, user's poor password management experience, and attacks such …
Context There is a great variety of techniques for performing authentication, like the use of text passwords or smart cards. Some techniques combine others into one, which is known …
JA McClintock, DE Canavor… - US Patent …, 2016 - Google Patents
BACKGROUND Verifying the identity of a person or group of people, referred to as authentication, has many uses in the context of computing. People often have multiple user …
A Bissada, A Olmsted - 2017 12th International Conference for …, 2017 - ieeexplore.ieee.org
Security has always been an important topic when it comes to the communication of sensitive data. With hardware advances allowing users the advantage of accessibility used …