TWO-FACTOR AUTHENTICATION METHODS THREATS ANALYSIS

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing two-factor authentication devices

It is expected that mobile phones will be used in various e-commerce applications, since it is handy and frequently used. Another important aspect is that mobile phones approach computers both with respect to programmability and capacity. One example of a cutting edge application is a generic authentication mechanism invented by a new Norwegian startup company: a mobile terminal is used as a pa...

متن کامل

SeCURITy AnAlySIS oF MobIle Two-FACToR AUThenTICATIon SCheMeS

Two-factor authentication (2FA) schemes aim at strengthening the security of login-password–based authentication by deploying secondary authentication tokens. In this context, mobile 2FA schemes require no additional hardware (such as a smartcard) to store and handle the secondary authentication token, and hence are considered as a reasonable tradeoff between security, usability, and cost. They...

متن کامل

On the Usability of Two-Factor Authentication

Smart-card-based password authentication, known as twofactor authentication, is one of the most widely used security mechanisms to validate the legitimacy of a remote client, who must hold a valid smart card and the correct password in order to successfully login the server. So far the research on this domain has mainly focused on developing more secure, privacy-preserving and efficient protoco...

متن کامل

Scalable Two-Factor Authentication Using Historical Data

Two-factor authentication is increasingly demanded in the Internet of Things (IoT), especially those deployed in the critical infrastructure. However, resource and operational constraints of typical IoT devices are the key impediment, especially when the IoT device acts as a verifier. This paper proposes a novel authentication factor (namely, historical data) which, when combined with the conve...

متن کامل

Two-Factor Web Authentication Via Voice

The increasing pressure for network accessible information and business applications demands secure, interoperable, cost efficient and user self-service authentication procedures. This paper describes the authors' work on 2-factor authentication for Web applications encompassing speech biometrics, and its relevance to security and cost effectiveness.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Radio Electronics, Computer Science, Control

سال: 2015

ISSN: 2313-688X,1607-3274

DOI: 10.15588/1607-3274-2015-1-7