Works matching DE "MULTI-factor authentication"
Results: 441
Enhancing User Trust in FinTech: A Multi-Factor Authentication Study.
- Published in:
- Journal of Applied Information Science, 2024, v. 12, n. 2, p. 44
- By:
- Publication type:
- Article
A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing.
- Published in:
- Journal of Information Science & Engineering, 2017, v. 33, n. 4, p. 907, doi. 10.6688/JISE.2017.33.4.3
- By:
- Publication type:
- Article
Informationen.
- Published in:
- Information -- Wissenschaft und Praxis, 2022, v. 73, n. 2/3, p. 138, doi. 10.1515/iwp-2022-2216
- Publication type:
- Article
Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 7, p. 9762, doi. 10.1007/s11227-023-05844-6
- By:
- Publication type:
- Article
TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 1, p. 865, doi. 10.1007/s11227-023-05507-6
- By:
- Publication type:
- Article
Per-user network access control kernel module with secure multifactor authentication.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 1, p. 970, doi. 10.1007/s11227-023-05480-0
- By:
- Publication type:
- Article
BTDA: Two-factor dynamic identity authentication scheme for data trading based on alliance chain.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 17, p. 19118, doi. 10.1007/s11227-023-05393-y
- By:
- Publication type:
- Article
RKMIS: robust key management protocol for industrial sensor network system.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 9, p. 9837, doi. 10.1007/s11227-022-05041-x
- By:
- Publication type:
- Article
VANET authentication protocols: security analysis and a proposal.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 2, p. 2153, doi. 10.1007/s11227-022-04736-5
- By:
- Publication type:
- Article
Provable user authentication scheme on ECC in multi-server environment.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 1, p. 725, doi. 10.1007/s11227-022-04641-x
- By:
- Publication type:
- Article
A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 15, p. 16678, doi. 10.1007/s11227-022-04464-w
- By:
- Publication type:
- Article
MESSB–LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 14, p. 16364, doi. 10.1007/s11227-022-04497-1
- By:
- Publication type:
- Article
A low-area design of two-factor authentication using DIES and SBI for IoT security.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 3, p. 4503, doi. 10.1007/s11227-021-04022-w
- By:
- Publication type:
- Article
A unified model based multifactor dimensionality reduction framework for detecting gene--gene interactions.
- Published in:
- Bioinformatics, 2016, v. 32, n. 17, p. i605, doi. 10.1093/bioinformatics/btw424
- By:
- Publication type:
- Article
Comprehensive Analysis of Internet Security Protocols and Standards for Enhanced Network Safety.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 332, doi. 10.54216/JCIM.150126
- By:
- Publication type:
- Article
Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners.
- Published in:
- Journal of Cybersecurity & Information Management, 2023, v. 12, n. 2, p. 83, doi. 10.54216/JCIM.120206
- By:
- Publication type:
- Article
A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol.
- Published in:
- Cryptography (2410-387X), 2024, v. 8, n. 4, p. 51, doi. 10.3390/cryptography8040051
- By:
- Publication type:
- Article
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices.
- Published in:
- Cryptography (2410-387X), 2023, v. 7, n. 3, p. 33, doi. 10.3390/cryptography7030033
- By:
- Publication type:
- Article
Navigating the Cybersecurity Landscape.
- Published in:
- Journal: American Water Works Association, 2024, v. 116, n. 7, p. 50, doi. 10.1002/awwa.2320
- By:
- Publication type:
- Article
To Fend Off Cyberattacks, Build a Castle.
- Published in:
- Journal: American Water Works Association, 2023, v. 115, n. 10, p. 44, doi. 10.1002/awwa.2198
- By:
- Publication type:
- Article
Smart Security System using Deep Learning and IoT.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4925
- By:
- Publication type:
- Article
Implementing a Robust Framework for Access Control and Identity Management.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4269
- By:
- Publication type:
- Article
Innovative Framework for Robust Image Security and Cloud Protection.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4107
- By:
- Publication type:
- Article
Intelligent Authentication Agent Model for Detection of ATM Card Fraud in Nigeria.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 2, p. 1541
- By:
- Publication type:
- Article
Multi-Factor Protection Mechanism for Secure Data Sharing in Cloud.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 323
- By:
- Publication type:
- Article
Two Factor Authentications of Automatic Teller Machine (ATM) Users via Radio Frequency and Face Identification.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 179
- By:
- Publication type:
- Article
Practical Authentication Mechanism using PassText and OTP.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 3, p. 132
- By:
- Publication type:
- Article
Security Vulnerabilities of Popular Multifactor Authentication Methods and a Remedy.
- Published in:
- Journal of Network & Information Security, 2023, v. 11, n. 1, p. 20
- By:
- Publication type:
- Article
Digital Crime Reporting System by using PHP.
- Published in:
- Journal of Applied Information Science, 2022, v. 10, n. 1, p. 44
- By:
- Publication type:
- Article
Multi-Factor Authentication for Net Banking.
- Published in:
- International Journal of System & Software Engineering, 2017, v. 5, n. 1, p. 11
- By:
- Publication type:
- Article
Feminicide as ‘act’ and ‘process’: a geography of gendered violence in Oaxaca.
- Published in:
- Gender, Place & Culture: A Journal of Feminist Geography, 2016, v. 23, n. 7, p. 989, doi. 10.1080/0966369X.2015.1073693
- By:
- Publication type:
- Article
An Improved 2-Factor Authentication Scheme for WSN Based on ECC.
- Published in:
- IETE Technical Review, 2023, v. 40, n. 2, p. 167, doi. 10.1080/02564602.2022.2055671
- By:
- Publication type:
- Article
OPTIMIZING AUTHENTICATION SECURITY IN INTELLIGENT SYSTEMS THROUGH VISUAL BIOMETRICS FOR ENHANCED EFFICIENCY.
- Published in:
- Radio Electronics, Computer Science, Control, 2024, n. 3, p. 54, doi. 10.15588/1607-3274-2024-3-6
- By:
- Publication type:
- Article
PROGRESSIVE INFORMATION TECHNOLOGIES.
- Published in:
- Radio Electronics, Computer Science, Control, 2020, n. 2, p. 106, doi. 10.15588/1607-3274-2020-2-11
- By:
- Publication type:
- Article
AWARENESS OF CYBERCRIME AMONG ONLINE BANKING USERS IN NIGERIA.
- Published in:
- Nigerian Journal of Technology, 2023, v. 42, n. 3, p. 406, doi. 10.4314/njt.v42i3.14
- By:
- Publication type:
- Article
A User Identity Management System for Cybercrime Control.
- Published in:
- Nigerian Journal of Technology, 2021, v. 40, n. 1, p. 129, doi. 10.4314/njt.v40i1.17
- By:
- Publication type:
- Article
Edge internet of things based smart home passwordless authentication.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 6, p. 7186, doi. 10.11591/ijece.v14i6.pp7186-7197
- By:
- Publication type:
- Article
Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2020, v. 10, n. 3, p. 3295, doi. 10.11591/ijece.v10i3.pp3295-3306
- By:
- Publication type:
- Article
Cryptanalysis on Privacy-aware Two-factor Authentication Protocol for Wireless Sensor Networks.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 1, p. 605, doi. 10.11591/ijece.v8i1.pp605-610
- By:
- Publication type:
- Article
Cybersecurity Resources for Accounting Practices.
- Published in:
- CPA Journal, 2022, v. 92, n. 11/12, p. 76
- By:
- Publication type:
- Article
IRS Tax Identity Theft and Fraud Resources.
- Published in:
- CPA Journal, 2020, v. 90/91, n. 12/1, p. 74
- By:
- Publication type:
- Article
Tips for Fighting Off Cybercrime in 2020.
- Published in:
- CPA Journal, 2020, v. 90, n. 3, p. 64
- By:
- Publication type:
- Article
Technology Touchstones for 2020.
- Published in:
- CPA Journal, 2019, v. 89, n. 12, p. 12
- By:
- Publication type:
- Article
Why Passwords Fail.
- Published in:
- CPA Journal, 2019, v. 89, n. 9, p. 70
- By:
- Publication type:
- Article
The Author Responds.
- Published in:
- 2017
- By:
- Publication type:
- Letter to the Editor
The Future of Two-Factor Authentication.
- Published in:
- 2017
- By:
- Publication type:
- Letter to the Editor
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
- Published in:
- International Journal of Network Management, 2017, v. 27, n. 3, p. n/a, doi. 10.1002/nem.1937
- By:
- Publication type:
- Article
Payments.
- Published in:
- Business Lawyer, 2022, v. 77, n. 4, p. 1273
- By:
- Publication type:
- Article
POST-QUANTUM CRYPTOGRAPHY FOR HEALTHCARE: A NUMBER THEORY BASED TWO-FACTOR MUTUAL AUTHENTICATION AND KEY EXCHANGE PROTOCOL OVER LATTICES FOR TMIS.
- Published in:
- Advances & Applications in Discrete Mathematics, 2024, v. 41, n. 1, p. 1, doi. 10.17654/0974165824001
- By:
- Publication type:
- Article
Voice Based Authentication System for Web Applications using Machine Learning.
- Published in:
- International Journal of Next-Generation Computing, 2022, v. 13, n. 5, p. 1312
- By:
- Publication type:
- Article