A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

Faceture ID: face and hand gesture multi-factor authentication using deep learning

ERM Aleluya, CT Vicente - Procedia Computer Science, 2018 - Elsevier
Access control is the act of providing privacy to a resource, and authentication through a
single factor is no longer reliable to provide robust protection against unauthorized access …

Battling COVID-19: The effectiveness of biometrics towards enhancing security of internet banking in malaysia

NM Kassim, T Ramayah, WN Mohamad… - International Journal of …, 2021 - igi-global.com
The research purpose is to identify which security factors that influence customer trust
towards the intention to continue using Internet banking in Malaysia. The primary …

Human performance in google's two-factor Authentication setup process

S Pandey, T Taffese, M Huang… - Proceedings of the …, 2019 - journals.sagepub.com
Due to the proliferation of online services such as social networking, online banking, and
cloud computing, more personal data are potentially exposed than ever before. Efforts such …

Using performance predictions to evaluate two-factor authentication setup processes

S Pandey, T Taffese - … of the Human Factors and Ergonomics …, 2021 - journals.sagepub.com
Low user adoption due to usability issues during setup is one of the primary challenges
facing two-factor authentication implementations. A method which could quickly provide …

CloudSec (3FA): a multifactor with dynamic click colour-based dynamic authentication for securing cloud environment

A Saravanan, SS Bama - International Journal of …, 2023 - inderscienceonline.com
Availability, scalability, and security are the main concerns in a cloud environment and so it
undergoes various challenges in the availability and security of sensitive and critical data …

Device fingerprinting identification and authentication: A two-fold use in multi-factor access control schemes

PE Manning - 2016 - search.proquest.com
Network security has always had an issue with secure authentication and identification. In
the current mixed device network of today, the number of nodes on a network has expanded …

Attitudes towards Text-based CAPTCHA from developing countries

N Nanglae, P Bhattarakosol - 2015 12th International …, 2015 - ieeexplore.ieee.org
CAPTCHA, especially Text-based CAPTCHA, is the most widely used for security over the
online environment in the present. That was used for identification automatic program …

Method and server for authentication using continuous real-time stream as an authentication factor

NK Jeyachandrasekar, KS Kiran - US Patent 11,750,599, 2023 - Google Patents
The present invention discloses a method and a server for authentication adaptive to a
secured application. The method comprising encrypting a part of continuous streams of …

[PDF][PDF] User attribute aware multi-factor authentication framework for cloud based systems

MMR Howlader - 2018 - lib.buet.ac.bd
Cloud computing has drawn a lot of attention in recent years. The facilities offered in the form
of Software as a Service (Saas), Platform as a Service (PaaS) and Infrastructure as a Service …