Two-factor Authentication
14 Followers
Recent papers in Two-factor Authentication
This study investigates the key elements an online service or product provider needs to consider when adopting another single-factor or two-factor authentication system. We also uncover the conditions that make the new one-factor or... more
The Coronavirus (COVID-19) crisis is having a massive impact globally with a rapid spread across the globe. Which made the World Health Organization declare it a pandemic. COVID-19 has prompted countries to adopt new behaviors such as... more
Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known. In today’s corporate environment, the need exists to ensure that only authorized individuals or customers... more
Human authentication is the security task whose job is to limit access to physical locations or computer network only to those with authorisation. This is done by equipped authorised users with passwords, tokens or using their biometrics.... more
— The ever-increasing amount of personal or sensitive data stored in a cloud data storage needs to be protected, since losing it is a very serious problem. As their popularity increases, cloud storage is becoming an option for user in... more
This paper presents the results of a project on using voice assistants to enable financial and commercial operations which require authentication with increased level of security. Several prototypes of authentication service with... more
One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart-card and password. A scheme of this type is called a smart-card-based password authentication scheme. The core feature of such a scheme is... more
This survey paper reviews all the major factors in validating three-level passwords such as one-factor authentication using passwords and two-factor authentication is not enough to provide better security to the modern digital age with... more
Authentication is a method for securing an account by verifying the user identity by inputting email with a password. Two factor authentications is an authentication system that combines the first-factor authentication with the second... more
Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known. In today’s corporate environment, the need exists to ensure that only authorized individuals or customers... more
The present voting system has many issues. The most prominent among them is the problem that the voter is not present in his/her country or local area at the time of elections, therefore, he/she is unable to cast his/her vote. Our... more
Laboratory (CSAIL) and machine-learning startup PatternEx recently developed an artificial intelligence platform called AI2 that they claim predicts cyber-attacks significantly better than existing systems by continuously incorporating... more
This paper presents the results of a project on using voice assistants to enable financial and commercial operations which require authentication with increased level of security. Several prototypes of authentication service with... more
In present day technological generation still, maximum of the housing societies use the old-age conventional technique for the administration work of the society. The bill generation is still done manually for each society member, and... more
Today, most authenticating applications using passwords are being compromised and the risk is becoming higher because it's becoming easier to download tools that will crack them. Passwords are no longer sufficient, as threats against them... more
Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known. In today’s corporate environment, the need exists to ensure that only authorized individuals or customers... more
Two factor authentication or 2FA is a security process in which the user firstly authenticate with a physical token and then with the PIN number. Th is two-factor authentication is very secure one because when someone access our computer... more
Identity theft is a frightening and often very serious concern to everyone. A novel risk-mitigation algorithm, the Hybrid Transaction Algorithm, is given in an effort to provide individuals with peace of mind (HTA). With the random codes,... more
This paper presents the results of a project on using voice assistants to enable financial and commercial operations which require authentication with increased level of security. Several prototypes of authentication service with... more
ABSTRACT The current research with EEG devices in the user authentication context has some deficiencies that address expensive equipment, the requirement of laboratory conditions and applicability. In this paper we address this issue by... more
This paper presents the results of a research on using voice assistants to enable financial and commercial operations which require authentication with increased level of security. Several prototypes of authentication service with... more
Egyptian NGOs are currently being targeted by Nile Phish, a large-scale phishing campaign. Almost all of the targets we identified are also implicated in Case 173, a sprawling legal case brought by the Egyptian government against NGOs,... more