• No results found

Two-Factor Authentication (2FA)

Improving Mobile Money Security with Two Factor Authentication

Improving Mobile Money Security with Two Factor Authentication

... The authentication methods used in computer systems are usually divided into three main types: those which are based on what a user knows (such as passwords, PINs, ...biometric authentication which include ...

7

1.
													Issues and challenges in two factor authentication algorithms

1. Issues and challenges in two factor authentication algorithms

... of two factor authentication into various parts of their ...have. Two factor authentication becoming an industry standard in a short amount of ...adopting 2FA, its only a ...

10

Replacing  Username/Password  with  Software-Only  Two-Factor  Authentication

Replacing Username/Password with Software-Only Two-Factor Authentication

... their paper An Improvement of Liao at al's Authentication Scheme using Smart Cards [23]. This scheme is essentially a two-factor authentication proposal. From the abstract of [15] .. we show ...

16

Two-factor  authentication  for  the  Bitcoin  protocol

Two-factor authentication for the Bitcoin protocol

... implement two-factor au- thentication is to share the private key and to create transaction signatures with a two-party signature ...one-time-password two-factor authentication, ...

18

Two-Factor Authentication and Its Adaptation to Online Education Systems

Two-Factor Authentication and Its Adaptation to Online Education Systems

... the two-factor authentication method and its adaptability to the online education ...system. Two-factor authentication is a security measure used especially in areas where ...

11

Index Terms: Password, Two Factor Authentication & Smart Card

Index Terms: Password, Two Factor Authentication & Smart Card

... anonymous two-factor authentication ...password authentication system is one of the most convenient and effective of two factor authentication mechanisms in distributed ...

6

Two Factor Authentication for Cloud Service Provider Invoking Biometric Authentication and Multiple Cloud Storage System

Two Factor Authentication for Cloud Service Provider Invoking Biometric Authentication and Multiple Cloud Storage System

... ABSTRACT: Cloud storage system provides facilitative file storage and sharing services for distributed clients . . However, some security concerns may impede users to use cloud storage. Among them, the integrity of ...

5

On  the  Usability  of  Two-Factor  Authentication

On the Usability of Two-Factor Authentication

... password authentication, known as two- factor authentication, is one of the most widely used security mechanisms to validate the legitimacy of a remote client, who must hold a valid smart card ...

9

Two-Factor  Authentication  with  End-to-End  Password  Security

Two-Factor Authentication with End-to-End Password Security

... 2nd factor as a local cryptographic component. Some Two-Factor Authentication schemes consider a scenario where the 2nd factor is a device D capable of storing cryptographic keys and ...

36

Efficient Two-Factor Authentication Protocol Using Password and Smart Card

Efficient Two-Factor Authentication Protocol Using Password and Smart Card

... Abstract—Two-factor authentication using password and smart card could reduce the risk than the use of a password ...a two-factor remote user authentication protocol using ...

7

Enhanced two Factor Authentication and Authorization Technique to Secure Data in Cloud

Enhanced two Factor Authentication and Authorization Technique to Secure Data in Cloud

... provide authentication level security to the various applications over a ...utilize two-factor validation (2FA). 2FA is exceptionally regular among online e- keeping money ...utilizing ...

5

Advanced Two Factor Authentication using Image Processing

Advanced Two Factor Authentication using Image Processing

... For secure PIN distribution we propose a unique sequence which is encrypted using RC4 algorithm and sent to the authentication and external servers for verification. In this system all important details of the ...

5

Vol 8, No 6 (2018)

Vol 8, No 6 (2018)

... fine-grained two-factor authentication (2FA) access control system for web- based cloud computing ...proposed 2FA access control system, an attribute-based access control mechanism is ...

5

TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS

TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS

... and authentication. Generally user has to provide two means of identification, one of which is a physical token, such as card and other of which is something memorized constant ...need authentication ...

9

A Novel Two-Factor Authentication System Robust Against Shoulder Surfing

A Novel Two-Factor Authentication System Robust Against Shoulder Surfing

... Node.js is one of the most widespread and well- accepted programming languages over last years which uses an event-driven, non-blocking I/O model that makes it lightweight and efficient between server and client, for the ...

7

Two Factor Authentication Based Contract Signing Protocol

Two Factor Authentication Based Contract Signing Protocol

... user authentication systems consign total trust on the authentication server where passwords or even easily derived password verification data are stored in a fundamental ...between two parties ...

6

Two-Factor Authentication using Mobile Phone

Two-Factor Authentication using Mobile Phone

... ABSTRACT: Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eaves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical ...

7

Improved Authentication and Protection of Data in the Cloud

Improved Authentication and Protection of Data in the Cloud

... In 2016 Perez et.al proposed a data-centric access control scheme for self- protected data that can run in untrusted CSPs. Their scheme is vulnerable to Man-in-Middle attack and uses more complex encryption ...

5

ONLINE BANKING USING TWO – FACTOR AUTHENTICATION

ONLINE BANKING USING TWO – FACTOR AUTHENTICATION

... The image is processed in the same resolution and then used as the vector dimension where the components are derived from the pixel value of the image. Basically human face recognition procedure consists of two ...

6

Two Factor Authentication using User Behavioural Analytics

Two Factor Authentication using User Behavioural Analytics

... • Track mobile device location data Mobile devices provide a great opportunity for tapping into the power of user behavior analytics. Forward-looking security programs are able to use the location tracker on smartphones ...

5

Show all 10000 documents...

Related subjects