Zobrazeno 1 - 10
of 22 945
pro vyhledávání: '"Multi-factor Authentication"'
Autor:
Bamashmos, Saeed1 (AUTHOR) 19268774@students.latrobe.edu.au, Chilamkurti, Naveen1 (AUTHOR), Shahraki, Ahmad Salehi1 (AUTHOR)
Publikováno v:
Sensors (14248220). Jun2024, Vol. 24 Issue 11, p3575. 22p.
Autor:
Han, Youngmin1 (AUTHOR), Lee, Subin1 (AUTHOR), Lee, Eun Kwang2 (AUTHOR), Yoo, Hocheon1 (AUTHOR) hyoo@gachon.ac.kr, Jang, Byung Chul3,4 (AUTHOR) bc.jang@knu.ac.kr
Publikováno v:
Advanced Science. May2024, Vol. 11 Issue 18, p1-14. 14p.
Package delivery is a critical aspect of various industries, but it often incurs high financial costs and inefficiencies when relying solely on human resources. The last-mile transport problem, in particular, contributes significantly to the expendit
Externí odkaz:
http://arxiv.org/abs/2411.18027
Autor:
Aburbeian, AlsharifHasan Mohamad1 (AUTHOR) a.aburbeian@student.aaup.edu, Fernández-Veiga, Manuel2 (AUTHOR) mveiga@det.uvigo.es
Publikováno v:
AI. Mar2024, Vol. 5 Issue 1, p177-194. 18p.
Nowadays, cyberattacks are growing exponentially, causing havoc to Internet users. In particular, authentication attacks constitute the major attack vector where intruders impersonate legitimate users to maliciously access systems or resources. Tradi
Externí odkaz:
http://arxiv.org/abs/2407.20459
Autor:
Wu, Lingfeng1 (AUTHOR) wulingfeng0517@163.com, Wen, Yunhua1,2 (AUTHOR) yhwen@dhu.edu.cn, Yi, Jinghai1 (AUTHOR)
Publikováno v:
Entropy. Aug2024, Vol. 26 Issue 8, p667. 26p.
Autor:
Borjigin, Suyun
The existing authentication system has two entry points (i.e., username and password fields) to interact with the outside, but neither of them has a gatekeeper, making the system vulnerable to cyberattacks. In order to ensure the authentication secur
Externí odkaz:
http://arxiv.org/abs/2407.19459
Autor:
Otta, Soumya Prakash1 (AUTHOR) p2016300@hyderabad.bits-pilani.ac.in, Panda, Subhrakanta1 (AUTHOR), Gupta, Maanak2 (AUTHOR), Hota, Chittaranjan1 (AUTHOR)
Publikováno v:
Future Internet. Apr2023, Vol. 15 Issue 4, p146. 20p.
Autor:
Büttner, Andre, Gruschka, Nils
Publikováno v:
Proceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP; 2024; ISBN 978-989-758-683-5, ISSN 2184-4356, SciTePress, pages 691-700
Nowadays, most online services offer different authentication methods that users can set up for multi-factor authentication but also as a recovery method. This configuration must be done thoroughly to prevent an adversary's access while ensuring the
Externí odkaz:
http://arxiv.org/abs/2403.15080
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.