CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and Passwords

J Han - Applied Sciences, 2024 - mdpi.com
Multi-factor authentication (MFA) is a system for authenticating an individual's identity using
two or more pieces of data (known as factors). The reason for using more than two factors is …

A survey on 802.11 MAC industrial standards, architecture, supporting emergency traffic and security: Future directions

SK Memon, M Hanafi Ahmad Hijazi, K Nisar… - Journal of Industrial …, 2022 - ray.yorksj.ac.uk
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Anonymity preserving secure authentication for a transparent internet voting process

KF Rafat - 2022 International Conference on Cyber Warfare …, 2022 - ieeexplore.ieee.org
The COVID'19 pandemic of recent times has changed the trends of socializing, that is, from
physical to online (virtual) presence. Likewise, remote or work-from-home culture has …

A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions

A Shahid Khan, M Ali Sattar, K Nisar, AAA Ibrahim… - Applied …, 2022 - ray.yorksj.ac.uk
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Conceptual review of DoS attacks in software defined networks

N Nisa, AS Khan, Z Ahmad, S Aqeel… - 2022 Applied …, 2022 - ieeexplore.ieee.org
Software-defined networking (SDN) is a new developing technology that has been widely
adopted by businesses because of its low cost and greater innovation in networks specially …

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

E Mostafa, MM Hassan, W Said - International Journal of Computer …, 2023 - koreascience.kr
Identity and access management in cloud computing is one of the leading significant issues
that require various security countermeasures to preserve user privacy. An authentication …

Perspicacious Apprehension of HDTbNB Algorithm Opposed to Security Contravention.

V Bhatnagar - Intelligent Automation & Soft Computing, 2023 - search.ebscohost.com
The exponential pace of the spread of the digital world has served as one of the assisting
forces to generate an enormous amount of information flowing over the network. The data …

[PDF][PDF] Sensitive Information Protection Model Based on Bayesian Game

Y Liu, Z Liu, X Wang, Q Yang, G Zuo… - CMC-COMPUTERS …, 2022 - cdn.techscience.cn
A game measurement model considering the attacker's knowledge background is proposed
based on the Bayesian game theory aiming at striking a balance between the protection of …

Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication

R Safin, A Abdiraman, A Nurusheva… - Bulletin of LN Gumilyov …, 2022 - bultech.enu.kz
Sensitive information was always one of the big trade-offs we always exchange big secrets
for small ones. On one hand, memorization of small secrets on the other hand tons of …

[PDF][PDF] Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks

IA ABBASI, NA KHAN - researchgate.net
With increased interest in 6G (6th Generation) cellular networks that can support intelligently
small-cell communication will result in effective device-to-device (D2D) communication. High …