Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …

Investigation of using captcha keystroke dynamics to enhance the prevention of phishing attacks

EK Alamri, AM Alnajim, SA Alsuhibany - Future Internet, 2022 - mdpi.com
Phishing is a cybercrime that is increasing exponentially day by day. In phishing, a phisher
employs social engineering and technology to misdirect victims towards revealing their …

Achieving information security by multi-modal iris-retina biometric approach using improved mask R-CNN

MA Abdel-Latif, MA El-Sayed - International journal of electrical and …, 2023 - hrcak.srce.hr
Sažetak The need for reliable user recognition (identification/authentication) techniques has
grown in response to heightened security concerns and accelerated advances in …

Pertahanan Pencegahan Serangan Social Engineering Menggunakan Two Factor Authentication (2Fa) Berbasis Sms (Short Message System)

S Slamet - SPIRIT, 2023 - mail.jurnal.stmik-yadika.ac.id
Advances in digital technology have made communication between humans faster and
easier. On the other hand, a lot of personal information is available online through social …

A Novel Two-Factor Authentication Scheme for Increased Security in Accessing the Moodle E-Learning Platform

V Baneş, C Ravariu, B Appasani, A Srinivasulu - Applied Sciences, 2023 - mdpi.com
Moodle is a platform designed for universal learning to support pedagogical interactions and
educational activities. The information technology (IT) administrator uses standard …

[PDF][PDF] The Social Network Dilemma: Safeguarding Privacy and Security in an Online Community.

T Bikku, NS Biyyapu, JC Sekhar… - … Journal of Safety & …, 2024 - researchgate.net
Social networks have become integral to our daily lives, facilitating connections, information
sharing, and community engagement. However, concerns regarding privacy and security …

One-Time Passwords: A Literary Review of Different Protocols and Their Applications

LE Almeida, BA Fernández, D Zambrano… - … on Advanced Research …, 2023 - Springer
Currently, user authentication only based on passwords can be inadequate due to different
types of vulnerabilities and attacks. To solve this problem, two-factor authentication is …

Improving OTP Authentication with PQC Algorithms

L Khorkheli, D Bourne, V Chakravarty… - 2024 Global …, 2024 - ieeexplore.ieee.org
Over the past few years, two-factor authentication (2FA) has emerged as a reliable defense
against various cyber-attacks, such as Man in the Middle (MITM) and cookie theft. By …

Cyber Crime Prevention and Techniques: A Comprehensive Survey

R Kumar, A Aditya, BD Shivahare - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The wide spread use of mobile device and computer or any device which enable access of
internet increases the incidents of cybercrime. The worldwide web creation revolutionized …

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

E Mostafa, MM Hassan, W Said - International Journal of Computer …, 2023 - koreascience.kr
Identity and access management in cloud computing is one of the leading significant issues
that require various security countermeasures to preserve user privacy. An authentication …