[HTML][HTML] BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities

MO Ahmad, G Tripathi, F Siddiqui, MA Alam, MA Ahad… - Sensors, 2023 - mdpi.com
The overwhelming popularity of technology-based solutions and innovations to address day-
to-day processes has significantly contributed to the emergence of smart cities. where …

[PDF][PDF] Designing of user authentication based on multi-factor authentication on wireless networks

DT Manurung - Jour of Adv Research in Dynamical & Control …, 2020 - researchgate.net
The purpose of Multi-factor Authentication is to create multiple layers of defense and make it
more difficult for unauthorized people to access targets such as physical locations, computer …

Review on User Authentication on Mobile Devices

UA Gimba, NAM Ariffin - Journal of Advanced Research in …, 2025 - semarakilmu.com.my
Mobile devices have made more easier and great convenience in the 21 st century, which
gives users freedom to gain access anytime, anywhere to numerous applications with the …

[PDF][PDF] Towards A secured financial transaction: A multi-factor authentication model

OG Lala, HO Aworinde, SI Ekpe - Proceedings of the 25th …, 2020 - researchgate.net
The need to secure financial transactions beyond token and knowledge-based approach is
imperative, hence, the need for biometric-based authentication model which authenticates …

Impact of access control and copyright in e-learning from user's perspective in the United Kingdom

G Akmayeva - 2017 - bura.brunel.ac.uk
The widespread adoption of E-Learning has largely been driven by the recommendations of
educational technologists seeking to convey the benefits of E-Learning as a valuable …

Mobile–Based Multi-Factor Authentication Scheme for Mobile Banking

ZBH Ombiro - 2016 - erepository.uonbi.ac.ke
Authentication for all mobile initiated financial transaction is a mandatory requirement.
USSD applications authenticate using PIN and Phone number while native applications can …

Assessment of the Impacts of Cyber Security on Student Information Management Systems: A Case of Ruaha Catholic University

F Kifaru, K Kavuta, A Semlambo - The Journal of Informatics, 2023 - journals.iaa.ac.tz
The pervasive use of technology in education has posed a security challenge that could
jeopardise student data and educational institutions' reputations, necessitating a thorough …

Multi-Factor Authentication Modeling using Petri Nets

MW Alawadhi, WS Awad - 2023 International Conference on IT …, 2023 - ieeexplore.ieee.org
As the cyber security field enhanced within years, threats and vulnerabilities have increased
massively among the world by each second. Such risks have resulted an immediate action …

A comparative analysis of the multi-factor authentication protocols presented in the literature

J Bals - 2022 - essay.utwente.nl
The Internet of Things continues to develop and impact or world and even our daily lives. it is
vastly changing our world, whether this at university, at home, at supermarket or even in …

[PDF][PDF] ECG-Based Biometric Schemes for Healthcare: A Systematic Review

EN Ramson, M Nehemiah, J Chaka - researchgate.net
Abstracts:-The use of Electro Cardio Gram (ECG) signals as a biometric modality has been
well-established in healthcare applications and facilities because of its robustness against …