Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …

[HTML][HTML] A novel secure authentication protocol for ehealth records in cloud with a new key generation method and minimized key exchange

BM Singh, J Natarajan - Journal of King Saud University-Computer and …, 2023 - Elsevier
In wake of covid19, many countries are shifting their paper-based health record
management from manual processes to digital ones. The major benefit of digital health …

Secure Internet Financial Transactions: A Framework Integrating Multi-Factor Authentication and Machine Learning

AHM Aburbeian, M Fernández-Veiga - AI, 2024 - mdpi.com
Securing online financial transactions has become a critical concern in an era where
financial services are becoming more and more digital. The transition to digital platforms for …

Emerging Trends in Cybersecurity Challenges with Reference to Pen Testing Tools in Society 5.0

G Kaur, N Bharathiraja, KD Singh… - … and Society 5.0, 2024 - taylorfrancis.com
Due to enormous dependence on digital technology, many companies across the globe are
facing trouble with cyber-assaults and cyber threats. The main motive of cyber-assaults and …

2-D Threshold Hyperchaotic Map and Application in Timed One-Time Password

H Bao, Y Su, Z Hua, Q Xu, M Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The design of hyperchaotic systems with complex dynamics and ultrawide parameter space
has been a research hotspot. In this article, we propose a 2-D threshold discrete map model …

Lightweight authentication scheme based on Elliptic Curve El Gamal

S Baccouri, H Farhat, T Azzabi… - Journal of Information and …, 2024 - Taylor & Francis
ABSTRACT Elliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents
the ideal choice for implementing public-key cryptography in resource-limited devices, such …

Blockchain‐Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services

S Shanmugam, R Natarajan, G HL… - IET Information …, 2024 - Wiley Online Library
Cloud computing (CC) is a network‐based concept where users access data at a specific
time and place. The CC comprises servers, storage, databases, networking, software …

Research on Internet Technology Innovation and Information Security Challenges in New Vehicle Energy Sector

W Lu, X Sun - International Journal of Communication …, 2023 - search.proquest.com
With the rapid proliferation and advancement of new energy vehicles, Internet technology
has garnered significant attention and application in this field. This study focuses on …

An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments

RM Jasmine, J Jasper, MR Geetha - Wireless Networks, 2024 - Springer
Today, cloud computing has received greater attention for storing and processing huge
amounts of data over the internet. Security concerns are one of the most challenging issues …

[PDF][PDF] Modelo de Autentificación de Doble Factor

AJR Riveros, JES Meza, ACM de los Santos - Innovación y Software, 2023 - redalyc.org
El presente artículo tiene como objetivo principal el desarrollo de un modelo que permita la
autentificación de un usuario para el control de accesos mediante el modelo de …