Implementation of wireless user authentication using wlc-forti framework

IA Supriyono, I Sembiring, A Setiawan… - Aptisi Transactions on …, 2023 - att.aptisi.or.id
Internet access at this time is a daily necessity that cannot be denied. It is certain that most
institutions and business entities require internet access in carrying out their activities …

[HTML][HTML] Self-Sovereign Management Scheme of Personal Health Record with Personal Data Store and Decentralized Identifier

TM Kim, T Ko, BW Hwang, HG Paek, WY Lee - Computational and …, 2024 - Elsevier
Conventional personal health record (PHR) management systems are centralized, making
them vulnerable to privacy breaches and single points of failure. Despite progress in …

A Dynamic and Incremental Graphical Grid Authentication Technique for Mobile and Web Applications

J Gong, ON Akande, CC Lin, S Agarwal - IEEE Access, 2024 - ieeexplore.ieee.org
Knowledge-based authentication techniques remain one of the proven ways of maintaining
confidentiality, ensuring integrity, and guaranteeing the availability of an information system …

Peningkatan Keamanan Autentikasi Data Pada E-Voting Dengan Menggunakan Algoritma Luc: Security Enhancements Of Authentication Data On E-Voting By Using …

BJD Sitompul - Jurnal Teknik Informatika, 2024 - ejournal.unsrat.ac.id
Electronic Voting or what is abbreviated as E-voting is a voting system in an online election
process. An e-voting system is very necessary to make it easier to carry out online elections …

Exploring perceptions and coping behaviors regarding imposed multifactor authentication usage: a university case study

H Haapaniemi - 2024 - jyx.jyu.fi
Data breaches are a growing concern since they can significantly harm people,
organizations, and societies. To protect sensitive data against unauthorized access, efficient …

[PDF][PDF] The Role of Behavioural Biometrics in Enhancing Industrial Cyber Security

J Noack - 2024 - monami.hs-mittweida.de
The protection of industrial systems is of great importance for ensuring their secure and
reliable utilisation. As the protective capabilities of traditional security measures, such as …

Blockchain based Authentication Techniques for Internet of Medical Things

S Botsa, MN Bhat - 2024 International Conference on Intelligent …, 2024 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) is a rapidly expanding field in the healthcare industry,
aimed at improving patient care. It strives to accomplish this by combining network …

A Comprehensive Survey of Graphical Passwords Authentication Systems that Provides Security

R Khedkar, A Pawar, K Dharmale… - … on Expert Clouds …, 2024 - ieeexplore.ieee.org
In today's data-driven world, the importance of cybersecurity has grown exponentially. The
biggest threat to data can be tampering with the authentication system that is the gateway to …

Factors Influencing The Experiences of End-users in Password-Based Authentication System

C Ugwu, E Ukwandu, L Ofusori, A Ezugwu, U Ome… - 2024 - researchsquare.com
Issues relating to password-based authentication has led to calls to an alternative in
passwordless authentication. This call represents a comprehensive drift from password …

A Preliminary Study of Human Vulnerabilities in User Password Asset Management

S Krishnan, MM Nadzir - Borneo International Journal eISSN 2636 …, 2024 - majmuah.com
Human weaknesses often compromise effective user password management, posing
serious hazards despite being a fundamental component of digital security. This study …