Skip to main content
This study investigates the key elements an online service or product provider needs to consider when adopting another single-factor or two-factor authentication system. We also uncover the conditions that make the new one-factor or... more
    • by 
    •   11  
      BiometricsDecision Support SystemsComputer SecurityAuthentication
The Coronavirus (COVID-19) crisis is having a massive impact globally with a rapid spread across the globe. Which made the World Health Organization declare it a pandemic. COVID-19 has prompted countries to adopt new behaviors such as... more
    • by 
    •   14  
      UsabilityCybercrimesPrivacyBiometrics
Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known. In today’s corporate environment, the need exists to ensure that only authorized individuals or customers... more
    • by 
    •   4  
      PerformancePINTwo-factor AuthenticationATM card
Human authentication is the security task whose job is to limit access to physical locations or computer network only to those with authorisation. This is done by equipped authorised users with passwords, tokens or using their biometrics.... more
    • by 
    •   13  
      Computer SciencePattern RecognitionBiometricsComputer Network
— The ever-increasing amount of personal or sensitive data stored in a cloud data storage needs to be protected, since losing it is a very serious problem. As their popularity increases, cloud storage is becoming an option for user in... more
    • by 
    •   9  
      Information SecurityComputer SecurityCryptographyAuthentication
This paper presents the results of a project on using voice assistants to enable financial and commercial operations which require authentication with increased level of security. Several prototypes of authentication service with... more
    • by 
    •   5  
      Computer ScienceCloud ServicesTwo-factor AuthenticationInfrastructure as Code
One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart-card and password. A scheme of this type is called a smart-card-based password authentication scheme. The core feature of such a scheme is... more
    • by 
    •   10  
      Distributed ComputingSecurity RequirementsProvable SecuritySmart Card
    • by 
    •   11  
      Markov ProcessesAuthenticationEntropySecurity Policy
This survey paper reviews all the major factors in validating three-level passwords such as one-factor authentication using passwords and two-factor authentication is not enough to provide better security to the modern digital age with... more
    • by 
    •   3  
      Network SecurityRemote AccessTwo-factor Authentication
Authentication is a method for securing an account by verifying the user identity by inputting email with a password. Two factor authentications is an authentication system that combines the first-factor authentication with the second... more
    • by 
    •   6  
      AuthenticationCybersecurityTwo-factor AuthenticationBlockchain
Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known. In today’s corporate environment, the need exists to ensure that only authorized individuals or customers... more
    • by 
    •   4  
      PerformancePINTwo-factor AuthenticationATM card
The present voting system has many issues. The most prominent among them is the problem that the voter is not present in his/her country or local area at the time of elections, therefore, he/she is unable to cast his/her vote. Our... more
    • by 
    •   5  
      Face RecognitionTemplate matchingRemote VotingOTP
This paper describes a login system utilizing Two Factor Authentication and Zero Knowledge Proof using Schnorr NIZK. The proposed system is designed to prevent password leak when being sent over insecure network or when used in an... more
    • by  and +1
    •   3  
      Applied CryptographyZero-Knowledge ProofsTwo-factor Authentication
Laboratory (CSAIL) and machine-learning startup PatternEx recently developed an artificial intelligence platform called AI2 that they claim predicts cyber-attacks significantly better than existing systems by continuously incorporating... more
    • by 
    •   7  
      Artificial IntelligenceExpert SystemsKnowledge ManagementIntrusion Detection Systems
The security of the web is a very important issue, because every day we make a variety of operations in it, for different reasons, during the day. Apart from protecting the information, contacts, accounts and data on the web, such data... more
    • by  and +2
    •   7  
      Facial RecognitionFace RecognitionWeb Application Security2FA
In the blockchain structure, the creator has used the Elliptic Curve Digital Signature Algorithm (ECDSA), which provides public and private keys for users. The Users use private keys to create digital signatures in order to generate... more
    • by  and +1
    •   18  
      MathematicsComputer ScienceAlgorithmsInformation Technology
This paper presents the results of a project on using voice assistants to enable financial and commercial operations which require authentication with increased level of security. Several prototypes of authentication service with... more
    • by 
    •   4  
      Cloud ServicesTwo-factor AuthenticationInfrastructure as CodeContinuous Integration/Continuous Deployment
In present day technological generation still, maximum of the housing societies use the old-age conventional technique for the administration work of the society. The bill generation is still done manually for each society member, and... more
    • by 
    •   3  
      Cloud StorageReal Time DatabaseTwo-factor Authentication
Today, most authenticating applications using passwords are being compromised and the risk is becoming higher because it's becoming easier to download tools that will crack them. Passwords are no longer sufficient, as threats against them... more
    • by 
    • Two-factor Authentication
Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known. In today’s corporate environment, the need exists to ensure that only authorized individuals or customers... more
    • by 
    •   4  
      PerformancePINTwo-factor AuthenticationATM card
This report describes the results of testing of authentication methods and applications for smartphones, including the methodology that was used. We want to determine the authentication methods that are perceived as secure and... more
    • by  and +1
    •   8  
      User Experience (UX)AuthenticationFingerprintFingerprint Recognition
This paper presents the results of a research on using voice assistants to enable financial and commercial operations which require authentication with increased level of security. Several prototypes of authentication service with... more
    • by  and +3
    •   5  
      Cloud ServicesTwo-factor AuthenticationInfrastructure as CodeDigital Voice Assistants (DVA’s)
    • by 
    •   3  
      Applied CryptographyZero-Knowledge ProofsTwo-factor Authentication
Two factor authentication or 2FA is a security process in which the user firstly authenticate with a physical token and then with the PIN number. Th is two-factor authentication is very secure one because when someone access our computer... more
    • by 
    •   3  
      Information SecurityComputer SecurityTwo-factor Authentication
    • by 
    •   7  
      Computer SciencePattern RecognitionRandom ProjectionsFeature Transformation
Identity theft is a frightening and often very serious concern to everyone. A novel risk-mitigation algorithm, the Hybrid Transaction Algorithm, is given in an effort to provide individuals with peace of mind (HTA). With the random codes,... more
    • by 
    • Two-factor Authentication
This paper presents the results of a project on using voice assistants to enable financial and commercial operations which require authentication with increased level of security. Several prototypes of authentication service with... more
    • by 
    •   4  
      Cloud ServicesTwo-factor AuthenticationInfrastructure as CodeContinuous Integration/Continuous Deployment
    • by 
    •   17  
      Computer ScienceInformation TechnologyInformation SecurityNetwork Security
ABSTRACT The current research with EEG devices in the user authentication context has some deficiencies that address expensive equipment, the requirement of laboratory conditions and applicability. In this paper we address this issue by... more
    • by 
    •   7  
      VisualizationTwo Phase FlowStressAuthentication
This paper presents the results of a research on using voice assistants to enable financial and commercial operations which require authentication with increased level of security. Several prototypes of authentication service with... more
    • by 
    •   4  
      Cloud ServicesTwo-factor AuthenticationInfrastructure as CodeContinuous Integration/Continuous Deployment
Egyptian NGOs are currently being targeted by Nile Phish, a large-scale phishing campaign. Almost all of the targets we identified are also implicated in Case 173, a sprawling legal case brought by the Egyptian government against NGOs,... more
    • by 
    •   8  
      EgyptAuthenticationSocial EngineeringEgyptian politics and foreign policy