TWO-FACTOR AUTHENTICATION METHODS THREATS ANALYSIS
نویسندگان
چکیده
منابع مشابه
Analyzing two-factor authentication devices
It is expected that mobile phones will be used in various e-commerce applications, since it is handy and frequently used. Another important aspect is that mobile phones approach computers both with respect to programmability and capacity. One example of a cutting edge application is a generic authentication mechanism invented by a new Norwegian startup company: a mobile terminal is used as a pa...
متن کاملSeCURITy AnAlySIS oF MobIle Two-FACToR AUThenTICATIon SCheMeS
Two-factor authentication (2FA) schemes aim at strengthening the security of login-password–based authentication by deploying secondary authentication tokens. In this context, mobile 2FA schemes require no additional hardware (such as a smartcard) to store and handle the secondary authentication token, and hence are considered as a reasonable tradeoff between security, usability, and cost. They...
متن کاملOn the Usability of Two-Factor Authentication
Smart-card-based password authentication, known as twofactor authentication, is one of the most widely used security mechanisms to validate the legitimacy of a remote client, who must hold a valid smart card and the correct password in order to successfully login the server. So far the research on this domain has mainly focused on developing more secure, privacy-preserving and efficient protoco...
متن کاملScalable Two-Factor Authentication Using Historical Data
Two-factor authentication is increasingly demanded in the Internet of Things (IoT), especially those deployed in the critical infrastructure. However, resource and operational constraints of typical IoT devices are the key impediment, especially when the IoT device acts as a verifier. This paper proposes a novel authentication factor (namely, historical data) which, when combined with the conve...
متن کاملTwo-Factor Web Authentication Via Voice
The increasing pressure for network accessible information and business applications demands secure, interoperable, cost efficient and user self-service authentication procedures. This paper describes the authors' work on 2-factor authentication for Web applications encompassing speech biometrics, and its relevance to security and cost effectiveness.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Radio Electronics, Computer Science, Control
سال: 2015
ISSN: 2313-688X,1607-3274
DOI: 10.15588/1607-3274-2015-1-7