Articles with "two factor" as a keyword



Photo by kattrinnaaaaa from unsplash

Supersaturated designs robust to two-factor interactions

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Statistical Planning and Inference"

DOI: 10.1016/j.jspi.2018.09.009

Abstract: Abstract A common assumption made in the study of supersaturated designs is the nonexistence of interaction effects. In this paper, however, we consider the constructions of supersaturated designs without this assumption. We propose and study… read more here.

Keywords: supersaturated designs; foldover supersaturated; two factor; factor interactions ... See more keywords
Photo from wikipedia

Exponential ergodicity of an affine two-factor model based on the α-root process

Sign Up to like & get
recommendations!
Published in 2017 at "Advances in Applied Probability"

DOI: 10.1017/apr.2017.37

Abstract: Abstract We study an affine two-factor model introduced by Barczy et al. (2014). One component of this two-dimensional model is the so-called α-root process, which generalizes the well-known Cox–Ingersoll–Ross process. In the α = 2… read more here.

Keywords: factor model; process; model; two factor ... See more keywords
Photo by tamiminaser from unsplash

Proportional subclass numbers in two-factor ANOVA

Sign Up to like & get
recommendations!
Published in 2018 at "Statistics"

DOI: 10.1080/02331888.2017.1319834

Abstract: ABSTRACT The between-within split of total sum of squares in one-way analysis of variance (ANOVA) is intuitively appealing and computationally simple, whether balanced or not. In the balanced two-factor setting, the same heuristic and computations… read more here.

Keywords: factor anova; numbers two; proportional subclass; two factor ... See more keywords
Photo from wikipedia

Minimum aberration designs for discrete choice experiments

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Statistical Theory and Practice"

DOI: 10.1080/15598608.2017.1299055

Abstract: A discrete choice experiment (DCE) is a survey method that gives insight into individual preferences for particular attributes. Traditionally, methods for constructing DCEs focus on identifying the individual effect of each attribute (a main effect).… read more here.

Keywords: aberration; minimum aberration; two factor; aberration designs ... See more keywords
Photo from wikipedia

An Efficient and Secure Two-Factor Password Authentication Scheme With Card Reader(Terminal) Verification

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2869535

Abstract: With regard to the privacy of client–server communication systems, most research works have concentrated on authentication to guarantee security. Among the investigated schemes, two-factor password authentication has been a major focus and has undergone considerable… read more here.

Keywords: factor password; password authentication; card reader; authentication ... See more keywords
Photo from wikipedia

Toward Usable and Accessible Two-Factor Authentication Based on the Piezo-Gyro Channel

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3150519

Abstract: Two-factor authentication (2FA) is crucial for protecting the security of users authenticating to online servers. Despite its importance, users hesitate to use 2FA, due to usability issues. In this report we present a prototype implementation… read more here.

Keywords: authentication; two factor; toward usable; factor authentication ... See more keywords
Photo from wikipedia

A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2020.3035566

Abstract: Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to extract private or personal data from the connected devices. Hence, a… read more here.

Keywords: usb storage; two factor; scheme; secure two ... See more keywords
Photo by kattrinnaaaaa from unsplash

MagAuth: Secure and Usable Two-Factor Authentication With Magnetic Wrist Wearables

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2021.3072598

Abstract: Secure and usable user authentication is the first line of defense against cyber attacks on smart end-user devices. Advanced hacking techniques pose severe threats to the traditional authentication systems based on the password/PIN/fingerprint. We propose… read more here.

Keywords: authentication; two factor; usable two; factor ... See more keywords
Photo by ldxcreative from unsplash

Towards Nonintrusive and Secure Mobile Two-Factor Authentication on Wearables

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2021.3133275

Abstract: Mobile devices are promising to apply two-factor authentication to improve system security. Existing solutions have certain limits of requiring extra user effort, which might seriously affect user experience and delay authentication time. In this paper,… read more here.

Keywords: authentication; two factor; mobile two; factor authentication ... See more keywords
Photo by thinkmagically from unsplash

Exact exponential cosmological solutions with two factor spaces of dimension m in EGB model with a Λ-term

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Geometric Methods in Modern Physics"

DOI: 10.1142/s0219887819500257

Abstract: A [Formula: see text]-dimensional Einstein–Gauss–Bonnet (EGB) model with the cosmological term [Formula: see text] is considered. We find a class of solutions with exponential time dependence of two scale factors, governed by two Hubble-like parameters… read more here.

Keywords: egb model; see text; formula see; two factor ... See more keywords
Photo by kattrinnaaaaa from unsplash

Dependable and Provable Secure Two-Factor Mutual Authentication Scheme Using ECC for IoT-Based Telecare Medical Information System

Sign Up to like & get
recommendations!
Published in 2022 at "Journal of Healthcare Engineering"

DOI: 10.1155/2022/9273662

Abstract: With the recent tremendous growth in technology, the Internet of Things (IoT) Telecare Medicine Information System (TMIS) is the most widely used medical information system with prominent achievements. Authentication schemes, which use Smart cards, offer… read more here.

Keywords: authentication; authentication scheme; two factor; information system ... See more keywords