Works matching DE "MULTI-factor authentication"
Results: 449
A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 1, p. 1, doi. 10.1007/s11277-017-4261-9
- By:
- Publication type:
- Article
Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5881, doi. 10.1007/s11277-017-4452-4
- By:
- Publication type:
- Article
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 3391, doi. 10.1007/s11277-017-4003-z
- By:
- Publication type:
- Article
Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 505, doi. 10.1007/s11277-016-3906-4
- By:
- Publication type:
- Article
Subtle Flaws in the Secure RFID Tag Searching Protocol: SRTS.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 1, p. 175, doi. 10.1007/s11277-016-3338-1
- By:
- Publication type:
- Article
Hash Based Multi-server Key Exchange Protocol Using Smart Card.
- Published in:
- Wireless Personal Communications, 2016, v. 87, n. 1, p. 225, doi. 10.1007/s11277-015-3040-8
- By:
- Publication type:
- Article
A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 3, p. 1593, doi. 10.1007/s11277-015-3008-8
- By:
- Publication type:
- Article
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 1, p. 35, doi. 10.1007/s11277-015-2378-2
- By:
- Publication type:
- Article
Blockchain-Based Secure Authentication Solution for Web Applications.
- Published in:
- Gazi Journal of Engineering Sciences (GJES) / Gazi Mühendislik Bilimleri Dergisi, 2023, v. 9, n. 3, p. 477, doi. 10.30855/gmbd.0705081
- By:
- Publication type:
- Article
A Comparative Assessment of Homomorphic Encryption Algorithms Applied to Biometric Information.
- Published in:
- Inventions (2411-5134), 2023, v. 8, n. 4, p. 102, doi. 10.3390/inventions8040102
- By:
- Publication type:
- Article
OFFLINE HANDWRITTEN SIGNATURES BASED MULTIFACTOR AUTHENTICATION IN CLOUD COMPUTING USING DEEP CNN MODEL.
- Published in:
- i-Manager's Journal On Cloud Computing, 2019, v. 6, n. 2, p. 13, doi. 10.26634/jcc.6.2.16640
- By:
- Publication type:
- Article
TRUSTED HYBRID MULTIFACTOR AUTHENTICATION FOR CLOUD USERS.
- Published in:
- i-Manager's Journal On Cloud Computing, 2020, v. 7, n. 1, p. 12, doi. 10.26634/jcc.7.1.16670
- By:
- Publication type:
- Article
Navigating the Cybersecurity Landscape.
- Published in:
- Journal: American Water Works Association, 2024, v. 116, n. 7, p. 50, doi. 10.1002/awwa.2320
- By:
- Publication type:
- Article
To Fend Off Cyberattacks, Build a Castle.
- Published in:
- Journal: American Water Works Association, 2023, v. 115, n. 10, p. 44, doi. 10.1002/awwa.2198
- By:
- Publication type:
- Article
Smart Security System using Deep Learning and IoT.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4925
- By:
- Publication type:
- Article
Implementing a Robust Framework for Access Control and Identity Management.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4269
- By:
- Publication type:
- Article
Innovative Framework for Robust Image Security and Cloud Protection.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4107
- By:
- Publication type:
- Article
Intelligent Authentication Agent Model for Detection of ATM Card Fraud in Nigeria.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 2, p. 1541
- By:
- Publication type:
- Article
Multi-Factor Protection Mechanism for Secure Data Sharing in Cloud.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 323
- By:
- Publication type:
- Article
Two Factor Authentications of Automatic Teller Machine (ATM) Users via Radio Frequency and Face Identification.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 179
- By:
- Publication type:
- Article
Practical Authentication Mechanism using PassText and OTP.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 3, p. 132
- By:
- Publication type:
- Article
ОСОБИСТИЙ КІБЕРЗАХИСТ ЕКОНОМІЧНОГО СУБ’ЄКТА КРИПТОВАЛЮТНОГО БІЗНЕСУ.
- Published in:
- Scientific Proceedings of Ostroh Academy National University Series, Economics, 2021, v. 51, n. 23, p. 23, doi. 10.25264/2311-5149-2021-23(51)-23-28
- By:
- Publication type:
- Article
A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 3, p. 39, doi. 10.3390/computers11030039
- By:
- Publication type:
- Article
Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System.
- Published in:
- Baghdad Science Journal, 2024, v. 21, p. 1765, doi. 10.21123/bsj.2024.10539
- By:
- Publication type:
- Article
A service-categorized security scheme with physical unclonable functions for internet of vehicles.
- Published in:
- Journal of Big Data, 2023, v. 10, n. 1, p. 1, doi. 10.1186/s40537-023-00865-7
- By:
- Publication type:
- Article
Role of authentication factors in Fin-tech mobile transaction security.
- Published in:
- Journal of Big Data, 2023, v. 10, n. 1, p. 1, doi. 10.1186/s40537-023-00807-3
- By:
- Publication type:
- Article
Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded video.
- Published in:
- Journal of Big Data, 2022, v. 9, n. 1, p. 1, doi. 10.1186/s40537-022-00662-8
- By:
- Publication type:
- Article
РОЗСЛІДУВАННЯ КІБЕРЗЛОЧИНІВ ЗА ДОПОМОГОЮ ПРИМАНОК У ХМАРНОМУ СЕРЕДОВИЩІ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2021, v. 27, n. 1, p. 20, doi. 10.18372/2225-5036.26.15574
- By:
- Publication type:
- Article
OPTIMIZING AUTHENTICATION SECURITY IN INTELLIGENT SYSTEMS THROUGH VISUAL BIOMETRICS FOR ENHANCED EFFICIENCY.
- Published in:
- Radio Electronics, Computer Science, Control, 2024, n. 3, p. 54, doi. 10.15588/1607-3274-2024-3-6
- By:
- Publication type:
- Article
PROGRESSIVE INFORMATION TECHNOLOGIES.
- Published in:
- Radio Electronics, Computer Science, Control, 2020, n. 2, p. 106, doi. 10.15588/1607-3274-2020-2-11
- By:
- Publication type:
- Article
A Fog Computing and Blockchain-based Anonymous Authentication Scheme to Enhance Security in VANET Environments.
- Published in:
- Engineering, Technology & Applied Science Research, 2025, v. 15, n. 1, p. 19143, doi. 10.48084/etasr.8663
- By:
- Publication type:
- Article
A Comprehensive Authentication Taxonomy and Lightweight Considerations in the Internet-of-Medical-Things (IoMT).
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 8, p. 1013, doi. 10.14569/ijacsa.2024.01508100
- By:
- Publication type:
- Article
A Systematic Review on Multi-Factor Authentication Framework.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 5, p. 1043, doi. 10.14569/ijacsa.2024.01505105
- By:
- Publication type:
- Article
Voice Based Authentication System for Web Applications using Machine Learning.
- Published in:
- International Journal of Next-Generation Computing, 2022, v. 13, n. 5, p. 1312
- By:
- Publication type:
- Article
Opportunities and Challenges of Artificial Intelligence Applied to Identity and Access Management in Industrial Environments.
- Published in:
- Future Internet, 2024, v. 16, n. 12, p. 469, doi. 10.3390/fi16120469
- By:
- Publication type:
- Article
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure.
- Published in:
- Future Internet, 2023, v. 15, n. 4, p. 146, doi. 10.3390/fi15040146
- By:
- Publication type:
- Article
A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications.
- Published in:
- Future Internet, 2021, v. 13, n. 12, p. 299, doi. 10.3390/fi13120299
- By:
- Publication type:
- Article
THE CONDRO GROUP HACK: INFILTRATING INSTANTSSL.it - A CASE STUDY.
- Published in:
- Journal of Information System Security, 2022, v. 18, n. 3, p. 177
- By:
- Publication type:
- Article
Securing Healthcare Communication: Strategies for Email Security.
- Published in:
- IUP Journal of Information Technology, 2024, v. 20, n. 4, p. 26
- By:
- Publication type:
- Article
A Move-To-Head-or-Tail (MTHT) Algorithm for the List Accessing Problem.
- Published in:
- IUP Journal of Information Technology, 2018, v. 14, n. 2, p. 90
- By:
- Publication type:
- Article
Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret.
- Published in:
- Information Systems Frontiers, 2023, v. 25, n. 2, p. 897, doi. 10.1007/s10796-022-10278-1
- By:
- Publication type:
- Article
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System.
- Published in:
- Information Systems Frontiers, 2021, v. 23, n. 4, p. 835, doi. 10.1007/s10796-021-10115-x
- By:
- Publication type:
- Article
SECURITY PRINCIPLES IN CLOUD COMPUTING.
- Published in:
- Annals of DAAAM & Proceedings, 2024, v. 35, p. 210, doi. 10.2507/35th.daaam.proceedings.028
- By:
- Publication type:
- Article
AN EFFICIENT USER AUTHENTICATICATION SCHEME FOR MULTIPLE ACCESSES SCENARIO IN WSN BASED IN IOT NOTION.
- Published in:
- International Journal of Organizational Innovation, 2020, v. 12, n. 3, p. 10
- By:
- Publication type:
- Article
SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2021, v. 46, n. 9, p. 9197, doi. 10.1007/s13369-021-05707-3
- By:
- Publication type:
- Article
An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2018, v. 43, n. 2, p. 661, doi. 10.1007/s13369-017-2709-6
- By:
- Publication type:
- Article
A PATTERN-BASED MULTI-FACTOR AUTHENTICATION SYSTEM.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 101, doi. 10.12694/scpe.v20i1.1460
- By:
- Publication type:
- Article
We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.
- Published in:
- PLoS ONE, 2024, v. 19, n. 10, p. 1, doi. 10.1371/journal.pone.0312266
- By:
- Publication type:
- Article
STANDARDS FINALLY COMING TOGETHER.
- Published in:
- Chemical Engineering, 2023, v. 130, n. 4, p. 18
- Publication type:
- Article
Multi-point Security by a Multiplatform-compatible Multifunctional Authentication and Encryption Board.
- Published in:
- Journal of Computing & Information Technology, 2018, v. 26, n. 4, p. 235, doi. 10.20532/cit.2018.1004174
- By:
- Publication type:
- Article