Zobrazeno 1 - 10
of 216
pro vyhledávání: '"Ali Abdullah S"'
Publikováno v:
IEEE Access, Vol 12, Pp 13277-13289 (2024)
The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated freque
Externí odkaz:
https://doaj.org/article/0c2864b7c0b34d3d9b9e733ae0568326
Publikováno v:
IEEE Access, Vol 8, Pp 79069-79078 (2020)
Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor can be one or more of something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint
Externí odkaz:
https://doaj.org/article/242781eb2a9044479182376f6c3a79be
This study presents an in-depth analysis of the security landscape in Bluetooth Low Energy (BLE) tracking systems, with a particular emphasis on Apple AirTags and Samsung SmartTags, including their cryptographic frameworks. Our investigation traverse
Externí odkaz:
http://arxiv.org/abs/2401.13584
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovativ
Externí odkaz:
http://arxiv.org/abs/2401.11326
The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated freque
Externí odkaz:
http://arxiv.org/abs/2401.06612
This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as secu
Externí odkaz:
http://arxiv.org/abs/2311.13416
The rise of smartphones has led to a significant increase in the usage of mobile payments. Mobile payments allow individuals to access financial resources and make transactions through their mobile devices while on the go. However, the current mobile
Externí odkaz:
http://arxiv.org/abs/2304.09468
The proliferation of sensitive information being stored online highlights the pressing need for secure and efficient user authentication methods. To address this issue, this paper presents a novel zero-effort two-factor authentication (2FA) approach
Externí odkaz:
http://arxiv.org/abs/2303.02503
For decades, the determination of an objects location has been implemented utilizing different technologies. Despite GPS (Global Positioning System) provides a scalable efficient and cost effective location services however the satellite emitted sign
Externí odkaz:
http://arxiv.org/abs/2210.00270
Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without hu
Externí odkaz:
http://arxiv.org/abs/2210.00175