[HTML][HTML] Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

On the use of emojis in mobile authentication

L Kraus, R Schmidt, M Walch, F Schaub… - ICT Systems Security and …, 2017 - Springer
Mobile authentication methods protect smartphones from unauthorized access, but also
require users to remember and frequently enter PINs, passwords, or graphical patterns. We …

[PDF][PDF] User experience with mobile security and privacy mechanisms

L Kraus - 2017 - depositonce.tu-berlin.de
Smartphones have become indispensable in the life of many people. They are constant
companions, connections to the world, information sources, and substitutes for other devices …

Review on multi-factor authentication (MFA) sources and operation challenges

R Neware, U Shrawankar, P Mangulkar… - International Journal of …, 2020 - igi-global.com
In recent years, with the mushrooming of internet-enabled mobile devices, there has been a
corresponding increase in information and data being transmitted and received. This …

The UX of things: exploring UX principles to inform security and privacy design in the smart home

G Chalhoub - 2022 - ora.ox.ac.uk
Smart homes are under attack. Threats can harm both the security of these homes and the
privacy of their inhabitants. As a result, in addition to delivering pleasant and aesthetic …

Enhancing Encryption Mechanisms using SHA-512 for user Authentication through Password & Face Recognition

A Vankadara, V Myneni, H Pendyala… - 2023 International …, 2023 - ieeexplore.ieee.org
Authentication is a process that is used to verify the identities of users, before allowing them
access to the system. Authentication technology controls access to systems by comparing a …

Authentication Attacks

A Vishnoi - Security Incidents & Response Against Cyber Attacks, 2021 - Springer
Internet is known as an amazing stage that changes the manner in which we impart and
perform business exchanges in current technology. It has now contacted each part of our …