Zobrazeno 1 - 10
of 152
pro vyhledávání: '"2FA"'
Autor:
Maciej Bartlomiejczyk, Imed El Fray
Publikováno v:
IEEE Access, Vol 12, Pp 123177-123192 (2024)
Two-factor authentication (2FA) is widely recognized as a secure authentication method. Despite the availability of multiple authentication methods, SMS one-time password (OTP) remains popular. However, SMS OTP is vulnerable to several attacks that p
Externí odkaz:
https://doaj.org/article/3c790542b5d84f2996556f222acd8013
Autor:
Nader Abdel Karim, Osama Ahmed Khashan, Hasan Kanaker, Waleed K. Abdulraheem, Mohammad Alshinwan, Abedal-Kareem Al-Banna
Publikováno v:
IEEE Access, Vol 12, Pp 741-757 (2024)
Online banking has become increasingly popular in recent years, making it a target for cyberattacks. Banks have implemented various user authentication methods to protect their customers’ online accounts. This paper reviews the state-of-the-art use
Externí odkaz:
https://doaj.org/article/93ec896433ad409aa555dc70113761fa
Autor:
Marwan Aziz Mohammed, Ali Ali Saber Mohammed, Pshtiwan Shakor, Salam Khalaf Abdullah, Saad Jabbar Abbas, Mohammed Abdulkreem Mohammed, Pardaz Zhumabaevna Kozhobekova
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 35, Iss 1, p 451 (2024)
Background: As the digital age unfolds, the requirement for durable, high-throughput communication systems grows inexorably. The convergence of Machine-to-Machine Communication (M2M) with emerging sixth-generation (6G) technology provides novel solut
Externí odkaz:
https://doaj.org/article/9372f349c8b74535ae0b15f11a30fd0d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Bohdan Rezanov, Heorhii Kuchuk
Publikováno v:
Сучасні інформаційні системи, Vol 6, Iss 2 (2022)
The relevance of research. Authentication is the process of confirming the authenticity of an object or subject of interaction in an information network by a presented identifier. Usually only one factor is used. However, most information security in
Externí odkaz:
https://doaj.org/article/5d4ff732898e4195bd2cfb505960b5af
Autor:
Mustafa Tanrıverdi
Publikováno v:
Sakarya University Journal of Computer and Information Sciences, Vol 3, Iss 3, Pp 343-354 (2020)
Today, many services are provided through web applications and the number of these applications is increasing rapidly. Nowadays, most users use their username and password to login to web applications. Many of these users also use the same login info
Externí odkaz:
https://doaj.org/article/9ef3972b93e848138cef46bcb16aa0ea
Autor:
Md. Onais Ahmad, Gautami Tripathi, Farheen Siddiqui, Mohammad Afshar Alam, Mohd Abdul Ahad, Mohd Majid Akhtar, Gabriella Casalino
Publikováno v:
Sensors, Vol 23, Iss 5, p 2757 (2023)
The overwhelming popularity of technology-based solutions and innovations to address day-to-day processes has significantly contributed to the emergence of smart cities. where millions of interconnected devices and sensors generate and share huge vol
Externí odkaz:
https://doaj.org/article/f6f4182740ff490584719d66e516da65
Publikováno v:
Applied Sciences, Vol 13, Iss 7, p 4425 (2023)
The rapid development of mobile computing (e.g., mobile health, mobile payments, and smart homes) has brought great convenience to our lives. It is well-known that the security and privacy of user information from these applications and services is c
Externí odkaz:
https://doaj.org/article/57db569859b44323b1aa1576069e2ebd
Autor:
Gerken, Jorina Freya, Wang, Zhaoying
Phishing is a form of social engineering, in which attackers attempt to trick victims with e-mails designed to look like legitimate requests (Vishwanath et al., 2011), aiming “to exploit human error or human behaviour with the objective of gaining
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-64806