Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …

Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network

AS Khan, MIB Yahya, KB Zen, JB Abdullah… - IEEE …, 2023 - ieeexplore.ieee.org
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …

MS‐ADS: multistage spectrogram image‐based anomaly detection system for IoT security

Z Ahmad, AS Khan, K Zen… - Transactions on Emerging …, 2023 - Wiley Online Library
The innovative computing idea of Internet‐of‐Things (IoT) architecture has gained
tremendous popularity over the last decade, resulting in an exponential increase in the …

Pertahanan Pencegahan Serangan Social Engineering Menggunakan Two Factor Authentication (2Fa) Berbasis Sms (Short Message System)

S Slamet - SPIRIT, 2023 - mail.jurnal.stmik-yadika.ac.id
Advances in digital technology have made communication between humans faster and
easier. On the other hand, a lot of personal information is available online through social …

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

E Mostafa, MM Hassan, W Said - International Journal of Computer …, 2023 - koreascience.kr
Identity and access management in cloud computing is one of the leading significant issues
that require various security countermeasures to preserve user privacy. An authentication …

Perspicacious Apprehension of HDTbNB Algorithm Opposed to Security Contravention.

V Bhatnagar - Intelligent Automation & Soft Computing, 2023 - search.ebscohost.com
The exponential pace of the spread of the digital world has served as one of the assisting
forces to generate an enormous amount of information flowing over the network. The data …