Articles with "factor authentication" as a keyword



Photo by alterego_swiss from unsplash

Privacy-Preserving and Efficient Truly Three-Factor Authentication Scheme for Telecare Medical Information Systems

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Medical Systems"

DOI: 10.1007/s10916-018-1047-x

Abstract: Significant development of information technologies has made Telecare Medical Information Systems (TMISs) increasingly popular. In a TMIS, patients upload their medical data through smart devices to obtain a doctor’s diagnosis. However, these smart devices have… read more here.

Keywords: information; factor authentication; authentication; telecare medical ... See more keywords
Photo from wikipedia

Toward Usable and Accessible Two-Factor Authentication Based on the Piezo-Gyro Channel

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3150519

Abstract: Two-factor authentication (2FA) is crucial for protecting the security of users authenticating to online servers. Despite its importance, users hesitate to use 2FA, due to usability issues. In this report we present a prototype implementation… read more here.

Keywords: authentication; two factor; toward usable; factor authentication ... See more keywords
Photo by ldxcreative from unsplash

Towards Nonintrusive and Secure Mobile Two-Factor Authentication on Wearables

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2021.3133275

Abstract: Mobile devices are promising to apply two-factor authentication to improve system security. Existing solutions have certain limits of requiring extra user effort, which might seriously affect user experience and delay authentication time. In this paper,… read more here.

Keywords: authentication; two factor; mobile two; factor authentication ... See more keywords
Photo by dogancan from unsplash

P/Key: PUF based second factor authentication

Sign Up to like & get
recommendations!
Published in 2023 at "PLOS ONE"

DOI: 10.1371/journal.pone.0280181

Abstract: One-time password (OTP) mechanisms are widely used to strengthen authentication processes. In time-based one-time password (TOTP) mechanisms, the client and server store common secrets. However, once the server is compromised, the client’s secrets are easy… read more here.

Keywords: authentication; second factor; based second; client ... See more keywords
Photo by campaign_creators from unsplash

A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure

Sign Up to like & get
recommendations!
Published in 2023 at "Future Internet"

DOI: 10.3390/fi15040146

Abstract: The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field… read more here.

Keywords: authentication; systematic survey; multi factor; factor ... See more keywords