Works matching DE "MULTI-factor authentication"
Results: 451
Designing a Two-Factor Authentication (2FA) System in E-Commerce Applications.
- Published in:
- Jurnal Indonesia Sosial Teknologi, 2025, v. 6, n. 1, p. 48
- By:
- Publication type:
- Article
Password based authentication for web based graphics computing services retrieval in cloud.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 36, p. 84357, doi. 10.1007/s11042-024-19044-8
- By:
- Publication type:
- Article
An efficient hybrid multifactor mutual authentication and session key agreement scheme for patient monitoring system using IoMT.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 36, p. 83805, doi. 10.1007/s11042-024-18625-x
- By:
- Publication type:
- Article
Jurisprudence: blockchain enabled privacy preserving framework complying digital ethics.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 34, p. 81107, doi. 10.1007/s11042-024-18771-2
- By:
- Publication type:
- Article
Watermarking approach for source authentication of web content in online social media: a systematic literature review.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 18, p. 54027, doi. 10.1007/s11042-023-17559-0
- By:
- Publication type:
- Article
Secured two factor authentication, graph based replication and encryption strategy in cloud computing.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 11, p. 16105, doi. 10.1007/s11042-022-13838-4
- By:
- Publication type:
- Article
Hand hygiene monitoring and compliance system using convolution neural networks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 30, p. 44431, doi. 10.1007/s11042-022-11926-z
- By:
- Publication type:
- Article
Machine vision theory and applications for cyber-physical systems.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 21995, doi. 10.1007/s11042-022-13261-9
- By:
- Publication type:
- Article
A secure and improved two factor authentication scheme using elliptic curve and bilinear pairing for cyber physical systems.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 22425, doi. 10.1007/s11042-022-12227-1
- By:
- Publication type:
- Article
Prediction of landslide displacement based on GA-LSSVM with multiple factors.
- Published in:
- Bulletin of Engineering Geology & the Environment, 2016, v. 75, n. 2, p. 637, doi. 10.1007/s10064-015-0804-z
- By:
- Publication type:
- Article
A multi‐device user authentication mechanism for Internet of Things.
- Published in:
- IET Networks (Wiley-Blackwell), 2023, v. 12, n. 5, p. 229, doi. 10.1049/ntw2.12088
- By:
- Publication type:
- Article
Positively Fearful: Activating the Individual's HERO Within to Explain Volitional Security Technology Adoption.
- Published in:
- Journal of the Association for Information Systems, 2023, v. 24, n. 3, p. 664, doi. 10.17705/1jais.00793
- By:
- Publication type:
- Article
Penetration or Skimming? Pricing Strategies for Software Platforms Considering Asymmetric Cross-Side Network Effects.
- Published in:
- Journal of the Association for Information Systems, 2022, v. 23, n. 4, p. 966, doi. 10.17705/1jais.00748
- By:
- Publication type:
- Article
From Encryption to Social Media: The Expanding Battlefield of Cyber Extortion Tactics.
- Published in:
- ISSA Journal, 2024, v. 22, n. 4, p. 15
- By:
- Publication type:
- Article
Temporary Elevated Access in the Cloud.
- Published in:
- ISSA Journal, 2024, v. 22, n. 3, p. 9
- By:
- Publication type:
- Article
EIGHT ARTIFICIAL INTELLIGENCE (AI) CYBER-TECH TRENDS OF 2023 AND WHAT IT MEANS FOR 2024.
- Published in:
- ISSA Journal, 2024, v. 22, n. 2, p. 17
- By:
- Publication type:
- Article
Reinforcing zero trust architectures for the modern era.
- Published in:
- ISSA Journal, 2023, v. 21, n. 1, p. 8
- By:
- Publication type:
- Article
DeFi and Cryptocurrency Hacks, Prospects, and Solutions.
- Published in:
- ISSA Journal, 2022, v. 20, n. 9, p. 9
- By:
- Publication type:
- Article
Phishing Attacks Cybersecurity.
- Published in:
- ISSA Journal, 2022, v. 20, n. 8, p. 15
- By:
- Publication type:
- Article
There's a Hole in Enterprise Cyber Defense: Detection-based Protection is Not Enough.
- Published in:
- ISSA Journal, 2021, v. 19, n. 9, p. 12
- By:
- Publication type:
- Article
The Remote Workforce Will Lead to More Ransomware Incidents in 2021.
- Published in:
- ISSA Journal, 2021, v. 19, n. 4, p. 9
- By:
- Publication type:
- Article
The Most Common Control Deficiencies in CMMC noncompliant DoD contractors.
- Published in:
- ISSA Journal, 2021, v. 19, n. 2, p. 31
- By:
- Publication type:
- Article
Mindlessly Following "Best Practices".
- Published in:
- ISSA Journal, 2020, v. 18, n. 6, p. 7
- By:
- Publication type:
- Article
Mobile Devices and the Fifth Amendment.
- Published in:
- ISSA Journal, 2019, v. 17, n. 12, p. 14
- By:
- Publication type:
- Article
We Are the Front Lines – Protecting Yourself Protects the Organization.
- Published in:
- ISSA Journal, 2019, v. 17, n. 4, p. 9
- By:
- Publication type:
- Article
The Erosion of Two-Factor Authentication.
- Published in:
- ISSA Journal, 2018, v. 16, n. 10, p. 6
- By:
- Publication type:
- Article
Biometric Electronic Signatures.
- Published in:
- ISSA Journal, 2017, v. 15, n. 11, p. 28
- By:
- Publication type:
- Article
The Council Gets a Clue.
- Published in:
- ISSA Journal, 2017, v. 15, n. 6, p. 26
- By:
- Publication type:
- Article
Securing Data to Prevent Data Theft.
- Published in:
- ISSA Journal, 2016, v. 14, n. 2, p. 31
- By:
- Publication type:
- Article
The Security Advice Magic Quadrant.
- Published in:
- ISSA Journal, 2016, v. 14, n. 1, p. 7
- By:
- Publication type:
- Article
TRUSTED EXECUTION ENVIRONMENT FOR PRIVACY PRESERVING BIOMETRIC AUTHENTICATION.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 162
- By:
- Publication type:
- Article
Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 1, p. 5, doi. 10.3390/math11010005
- By:
- Publication type:
- Article
LLAKEP: A Low-Latency Authentication and Key Exchange Protocol for Energy Internet of Things in the Metaverse Era.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 14, p. N.PAG, doi. 10.3390/math10142545
- By:
- Publication type:
- Article
OPTIMIZING AUTHENTICATION SECURITY IN INTELLIGENT SYSTEMS THROUGH VISUAL BIOMETRICS FOR ENHANCED EFFICIENCY.
- Published in:
- Radio Electronics, Computer Science, Control, 2024, n. 3, p. 54, doi. 10.15588/1607-3274-2024-3-6
- By:
- Publication type:
- Article
PROGRESSIVE INFORMATION TECHNOLOGIES.
- Published in:
- Radio Electronics, Computer Science, Control, 2020, n. 2, p. 106, doi. 10.15588/1607-3274-2020-2-11
- By:
- Publication type:
- Article
Rapid Identification of Officinal Akebiae Caulis and Its Toxic Adulterant Aristolochiae Manshuriensis Caulis (Aristolochia manshuriensis) by Loop-Mediated Isothermal Amplification.
- Published in:
- Frontiers in Plant Science, 2016, p. 1, doi. 10.3389/fpls.2016.00887
- By:
- Publication type:
- Article
STATISTICAL ANALYSIS OF SPLIT-PLOT DESIGN USING SPECIAL TYPE OF GRAPHS.
- Published in:
- Reliability: Theory & Applications, 2024, v. 19, n. 1, p. 254
- By:
- Publication type:
- Article
EFFICIENT FRAMEWORK OF SECURITY FOR INTERNET OF THINGS.
- Published in:
- Reliability: Theory & Applications, 2024, v. 19, n. 1, p. 217
- By:
- Publication type:
- Article
A multifactorial investigation of captive gorillas’ intraspecific gestural laterality.
- Published in:
- Laterality, 2018, v. 23, n. 5, p. 538, doi. 10.1080/1357650X.2017.1410167
- By:
- Publication type:
- Article
Opportunities and Challenges of Artificial Intelligence Applied to Identity and Access Management in Industrial Environments.
- Published in:
- Future Internet, 2024, v. 16, n. 12, p. 469, doi. 10.3390/fi16120469
- By:
- Publication type:
- Article
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure.
- Published in:
- Future Internet, 2023, v. 15, n. 4, p. 146, doi. 10.3390/fi15040146
- By:
- Publication type:
- Article
A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications.
- Published in:
- Future Internet, 2021, v. 13, n. 12, p. 299, doi. 10.3390/fi13120299
- By:
- Publication type:
- Article
Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 6, p. 1147, doi. 10.3390/sym15061147
- By:
- Publication type:
- Article
How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 9, p. 1629, doi. 10.3390/sym13091629
- By:
- Publication type:
- Article
CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 4, p. 698, doi. 10.3390/sym13040698
- By:
- Publication type:
- Article
Lightweight Secure Authentication and Key Distribution Scheme for Vehicular Cloud Computing.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 3, p. 484, doi. 10.3390/sym13030484
- By:
- Publication type:
- Article
An Efficient Two Factor User Authentication and Key Exchange Protocol for Telecare Medical Information System.
- Published in:
- International Journal of Mathematics & Computer Science, 2020, v. 15, n. 4, p. 1015
- By:
- Publication type:
- Article
BEYOND "TWO SOURCE THEORY" AND "SOLA SCRIPTURA": ECUMENICAL PERSPECTIVES ON SCRIPTURE AND TRADITION.
- Published in:
- Acta Theologica, 2015, v. 35, n. 2, p. 66, doi. 10.4314/actat.v35i2.5
- By:
- Publication type:
- Article
Annals Graphic Medicine - Two-Factor Authentication.
- Published in:
- Annals of Internal Medicine, 2024, v. 177, n. 11, p. 1, doi. 10.7326/G24-0068
- By:
- Publication type:
- Article
Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 14, p. 11043, doi. 10.3390/su151411043
- By:
- Publication type:
- Article