Securing remote access to information systems of critical infrastructure using two-factor authentication

R Bruzgiene, K Jurgilas - Electronics, 2021 - mdpi.com
Information systems of critical infrastructure provide services on which the core functions of a
state and its economy depend as well as welfare of society. Such systems are becoming an …

Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices

SM Muzammal, MA Shah, SJ Zhang… - International journal of …, 2016 - Springer
With the rapidly escalating use of smart devices and fraudulent transaction of users' data
from their devices, efficient and reliable techniques for authentication of the smart devices …

[PDF][PDF] Modern authentication techniques in smart phones: Security and usability perspective

U Shafique, H Khan, S Waqar, A Sher… - … International Journal of …, 2017 - academia.edu
A smartphone has more advanced computing ability and connectivity than basic featured
phones. Presently, we are moving from the Internet society to a mobile society where more …

[PDF][PDF] Cybersecurity mechanism and user authentication security methods

MM Nabi, F Nabi - International Journal of Electronics and …, 2022 - ijeie.jalaxy.com.tw
New methods have come to secure user-defined password techniques, which often use
traditional authentication-based security methods and user privacy. This paper has …

Pick location security: Seamless integrated multi-factor authentication

KI Ramatsakane, WS Leung - 2017 IST-Africa Week …, 2017 - ieeexplore.ieee.org
Authentication is one of the key aspects of securing applications and systems alike. While in
most existing systems this is achieved using usernames and passwords it has been …

[PDF][PDF] Using geographical location as an authentication factor to enhance mCommerce applications on smartphones

T Kuseler, IA Lami - Int. J. Comput. Sci. Secur, 2012 - Citeseer
Smartphones are increasingly used to perform mCommerce applications whilst on the move.
50% of all Smartphone owners in the US used their Smartphone for banking transactions in …

Access control for the cloud based on multi-device authentication

L Gonzalez-Manzano, JM De Fuentes… - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Cloud-based storage services such as Box or Dropbox are proliferating. They are being
commonly adopted to store private information, which is beneficial for resource-constrained …

[PDF][PDF] Fingerprint and location based multifactor authentication for mobile applications

NA Aldumiji, EA Khan - International Journal of Engineering and …, 2019 - researchgate.net
Authentication, which involves the verification of identity, is one of the most important
security features. It usually depends on three factors: something you know (knowledge) …

[PDF][PDF] Integrating Cancellable Biometrics with Geographical Location for Effective Unattended Authentication of Users of Mobile Devices.

H Al-Assam, IA Lami, T Kuseler - J. Commun., 2013 - jocm.us
Over the past decade, security and privacy concerns about the growing deployment of
biometrics as a proof of identity have motivated researchers to investigate solutions such as …

Location-assured, multifactor authentication on smartphones via LTE communication

T Kuseler, IA Lami, H Al-Assam - Mobile Multimedia/Image …, 2013 - spiedigitallibrary.org
With the added security provided by LTE, geographical location has become an important
factor for authentication to enhance the security of remote client authentication during …