Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Ali Abdullah S. AlQahtani"'
Publikováno v:
IEEE Access, Vol 12, Pp 13277-13289 (2024)
The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated freque
Externí odkaz:
https://doaj.org/article/0c2864b7c0b34d3d9b9e733ae0568326
Publikováno v:
IEEE Access, Vol 8, Pp 79069-79078 (2020)
Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor can be one or more of something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint
Externí odkaz:
https://doaj.org/article/242781eb2a9044479182376f6c3a79be
Publikováno v:
2023 Systems and Information Engineering Design Symposium (SIEDS).
Publikováno v:
2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC).
Autor:
Jean Gourd, Ali Abdullah S. AlQahtani
Traditional two-factor authentication (2FA) systems often require users to enter a code or use a physical token, which can be inconvenient or inconvenient. In this paper, we propose a novel zero-effort 2FA system that utilizes the characteristics of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::28ab8724ba6027afc5e5f4c8993bf78e
https://doi.org/10.36227/techrxiv.21824736.v2
https://doi.org/10.36227/techrxiv.21824736.v2
Two-factor authentication (2FA) is a widely adopted security measure that requires users to provide an additional layer of authentication beyond a username and password in order to access protected resources. While traditional 2FA methods rely on the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9430ee6730e1a6830e707e82df4206f7
https://doi.org/10.36227/techrxiv.21861798.v1
https://doi.org/10.36227/techrxiv.21861798.v1
Autor:
Ali Abdullah S. AlQahtani
Traditional two-factor authentication (2FA) systems often require users to enter a code or use a physical token, which can be inconvenient or inconvenient. In this paper, we propose a novel zero-effort 2FA system that utilizes the characteristics of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f85d0147fd88a41f2e9551a06d09b0fe
https://doi.org/10.36227/techrxiv.21824736.v1
https://doi.org/10.36227/techrxiv.21824736.v1
The proliferation of sensitive information being stored online highlights the pressing need for secure and efficient user authentication methods. To address this issue, this paper presents a novel zero-effort two-factor authentication (2FA) approach
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c48fcd6f42f0e85d8392ecee59ebc749
Publikováno v:
2022 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob).
Publikováno v:
2022 IEEE 13th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).