A systematic survey of multi-factor authentication for cloud infrastructure

SP Otta, S Panda, M Gupta, C Hota - Future Internet, 2023 - mdpi.com
The unauthorized usage of various services and resources in cloud computing is something
that must be protected against. Authentication and access control are the most significant …

Passphrase and keystroke dynamics authentication: Usable security

B Bhana, S Flowerday - Computers & Security, 2020 - Elsevier
It was found that employees spend a total of 2.25 days within 60 days on password-related
activities. The time consumed by this is unproductive and has a negative impact on usability …

Evaluation and selection models for ensemble intrusion detection systems in IoT

R Alghamdi, M Bellaiche - IoT, 2022 - mdpi.com
Using the Internet of Things (IoT) for various applications, such as home and wearables
devices, network applications, and even self-driven vehicles, detecting abnormal traffic is …

A survey on user authentication factors

AAS AlQahtani, Z El-Awadi… - 2021 IEEE 12th Annual …, 2021 - ieeexplore.ieee.org
Today, digital information decisively permeates all aspects of modern society. In such a
connected world, one of the critical factors in maintaining the security of transmitted data is …

Age and gender as cyber attribution features in keystroke dynamic-based user classification processes

I Tsimperidis, C Yucel, V Katos - Electronics, 2021 - mdpi.com
Keystroke dynamics are used to authenticate users, to reveal some of their inherent or
acquired characteristics and to assess their mental and physical states. The most common …

A simple and secure reformation-based password scheme

M Ali, A Baloch, A Waheed, M Zareei, R Manzoor… - IEEE …, 2021 - ieeexplore.ieee.org
The electronic applications of financial institutions like banks and insurance companies use
either token-based, biometric-based, or knowledge-based password scheme to keep the …

Comparative and Preventive Analysis of Dictionary Attacks

S Shourya, I Venkatachalam, H Patel… - … Conference on Science …, 2023 - Springer
Hacking is one of the most widespread issues that the general public faces today. Hackers
essentially use some social engineering techniques, combined with the publicly available …

Advanced Cybersecurity Tools and Techniques

RR Nair, N Santhosh, K Dodiya - Advanced Techniques and …, 2025 - taylorfrancis.com
Cybersecurity is becoming crucial for the information technology industry. Cybersecurity
trends, new advancements, security risks, and difficulties are discussed. The thorough …

Chapter Zero-Knowledge Proof for Trusted Construction Management: A Preliminary Study of Adaptive Blockchain BIM Identity Authentication

L Kong, R Zhao, F Xue - 2023 - library.oapen.org
Blockchain technology emphasizes trust and collaboration through distributed networks and
is deemed to contribute to building information modeling (BIM) based construction …

Comparative and Preventive Analysis of Dictionary Attacks Check for updates

S Shourya, I Venkatachalam, H Patel… - Recent Advances in …, 2023 - books.google.com
With the shift to cloud and increasing usage of social media platforms that are existing and
those that are newly being released every day, risk quotient is also shooting up. Smallest of …