Zobrazeno 1 - 10
of 2 484
pro vyhledávání: '"one-time password"'
Publikováno v:
International Journal of Science, Technology, Engineering and Mathematics, Vol 4, Iss 3, Pp 126-153 (2024)
Conventional account credentials that include a password are becoming obsolete due to their limitations and susceptibility to cyber threats. This demands using alternative authentication methods that eliminate the risks of breaches and phishing. This
Externí odkaz:
https://doaj.org/article/6c3a220823c64e798410f5b415416765
Publikováno v:
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Vol 18, Iss 1, Pp 61-72 (2024)
Digital money is the fundamental driving factor behind today's modern economy. Credit/debit cards, e-wallets, and other contactless payment options are widely available nowadays. This also raises the security risk associated with passwords in online
Externí odkaz:
https://doaj.org/article/2f0d4116bfa84da3a59ff816055ef4b4
Autor:
Maciej Bartlomiejczyk, Imed El Fray
Publikováno v:
IEEE Access, Vol 12, Pp 123177-123192 (2024)
Two-factor authentication (2FA) is widely recognized as a secure authentication method. Despite the availability of multiple authentication methods, SMS one-time password (OTP) remains popular. However, SMS OTP is vulnerable to several attacks that p
Externí odkaz:
https://doaj.org/article/3c790542b5d84f2996556f222acd8013
Publikováno v:
Jurnal Jaringan Telekomunikasi, Vol 13, Iss 2, Pp 162-168 (2023)
The library is one of the rooms or facilities used as a learning center. Data on library visitors with a locker at the Polinema library is in a different place, where the Polinema library locker are outside the library area which can be misused for s
Externí odkaz:
https://doaj.org/article/df396ae58fd44055ad60dc86202091a1
Publikováno v:
Jurnal Jaringan Telekomunikasi, Vol 12, Iss 4, Pp 201-207 (2022)
Cluster housing is chosen by many people because of the security system is uses one gate system. However, the housing portal system that is often encountered still uses human labor and guest data recording is also still done manually. It often happen
Externí odkaz:
https://doaj.org/article/9720d121ba7346b48e29ac017613cd6b
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
R. Manjupargavi, M.V. Srinath
Publikováno v:
ICTACT Journal on Communication Technology, Vol 13, Iss 2, Pp 2638-2688 (2022)
Cloud Computing (CC) has grown increasingly important in recent years, and the security issues related to the cloud model are also on the rise. The most used computer system authentication mechanism is One Time Password (OTP) which is easier and more
Externí odkaz:
https://doaj.org/article/5ab0b6da0efa474a83f0a16ec642eaa3
Autor:
Wen-Chung Tsai
Publikováno v:
Sensors, Vol 24, Iss 3, p 853 (2024)
With the advent of 6G Narrowband IoT (NB-IoT) technology, IoT security faces inevitable challenges due to the application requirements of Massive Machine-Type Communications (mMTCs). In response, a 6G base station (gNB) and User Equipment (UE) necess
Externí odkaz:
https://doaj.org/article/ecf8c7617764492ea9edf4b37384d01d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.