Data privacy and security in it: a review of techniques and challenges

OA Farayola, OL Olorunfemi, PO Shoetan - Computer Science & IT …, 2024 - fepbl.com
In today's interconnected digital world, data privacy and security have emerged as
paramount concerns for individuals, organizations, and governments alike. This review …

[HTML][HTML] A Survey of the Real-Time Metaverse: Challenges and Opportunities

M Hatami, Q Qu, Y Chen, H Kholidy, E Blasch… - Future Internet, 2024 - mdpi.com
The metaverse concept has been evolving from static, pre-rendered virtual environments to
a new frontier: the real-time metaverse. This survey paper explores the emerging field of real …

Optimizing network security with machine learning and multi-factor authentication for enhanced intrusion detection

RK Mahmood, AI Mahameed, NQ Lateef… - Journal of Robotics …, 2024 - journal.umy.ac.id
This study examines the utilization of machine learning methodologies and multi-factor
authentication (MFA) to bolster network security, specifically targeting network intrusion …

Blockchain Technology for Monitoring Energy Production for Reliable and Secure Big Data

M Gerardi, F Fallucchi, F Orecchini - Electronics, 2023 - mdpi.com
The growing adoption of renewable energy sources and the need for more efficient and
secure energy grids are revolutionizing the energy sector. Electricity monitoring becomes an …

[PDF][PDF] MULTI-FACTOR AUTHENTICATION FOR CLOUD

S Gudimetla - International Research Journal of Modernization in …, 2024 - researchgate.net
As cloud computing evolves and new technology emerges, there is a rising concern around
cloud storage security, considered one of the top issues. In this article, the author covers the …

Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity

MIM Yusop, NH Kamarudin, NHS Suhaimi… - IEEE …, 2025 - ieeexplore.ieee.org
As reliance on digital services grows, traditional password-based authentication methods
have been increasingly scrutinized due to their susceptibility to cyber-attacks, including …

Multi-Factor Authentication: A User Experience Study

S Baseer, KS Charumathi - Available at SSRN 4840295, 2024 - papers.ssrn.com
Usability issues prevent multi-factor authentication (MFA) systems from being widely used,
despite the fact that they are essential for improving security measures. This study explores …

Computational challenges and solutions: Prime number generation for enhanced data security

A Ezz-Eldien, M Ezz, A Alsirhani, AM Mostafa… - PloS one, 2024 - journals.plos.org
This paper addresses the computational methods and challenges associated with prime
number generation, a critical component in encryption algorithms for ensuring data security …

Navigating the nexus of security and privacy in modern financial technologies

F Olweny - GSC Advanced Research and Reviews, 2024 - gsconlinepress.com
As the financial service sector rapidly evolves with the integration of cutting-edge
technologies, the intersection of security and privacy becomes paramount. This paper …

[HTML][HTML] Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol

R Almari, A Almosallam, S Almousa, S Alahmadi - Applied Sciences, 2024 - mdpi.com
Over the years, there has been a significant surge in the popularity of instant messaging
applications (IMAs). However, the message notification functionality in IMAs exhibits certain …