Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Medical Systems"
DOI: 10.1007/s10916-018-1047-x
Abstract: Significant development of information technologies has made Telecare Medical Information Systems (TMISs) increasingly popular. In a TMIS, patients upload their medical data through smart devices to obtain a doctor’s diagnosis. However, these smart devices have…
read more here.
Keywords:
information;
factor authentication;
authentication;
telecare medical ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3150519
Abstract: Two-factor authentication (2FA) is crucial for protecting the security of users authenticating to online servers. Despite its importance, users hesitate to use 2FA, due to usability issues. In this report we present a prototype implementation…
read more here.
Keywords:
authentication;
two factor;
toward usable;
factor authentication ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Mobile Computing"
DOI: 10.1109/tmc.2021.3133275
Abstract: Mobile devices are promising to apply two-factor authentication to improve system security. Existing solutions have certain limits of requiring extra user effort, which might seriously affect user experience and delay authentication time. In this paper,…
read more here.
Keywords:
authentication;
two factor;
mobile two;
factor authentication ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "PLOS ONE"
DOI: 10.1371/journal.pone.0280181
Abstract: One-time password (OTP) mechanisms are widely used to strengthen authentication processes. In time-based one-time password (TOTP) mechanisms, the client and server store common secrets. However, once the server is compromised, the client’s secrets are easy…
read more here.
Keywords:
authentication;
second factor;
based second;
client ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Future Internet"
DOI: 10.3390/fi15040146
Abstract: The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field…
read more here.
Keywords:
authentication;
systematic survey;
multi factor;
factor ... See more keywords