2022
DOI: 10.32604/iasc.2022.021786
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security

Abstract: This study presents the current state of research on multi-factor authentication. Authentication is one of the important traits in the security domain as it ensures that legitimate users have access to the secure resource. Attacks on authentication occur even before digital access is given, but it becomes quite challenging with remote access to secure resources. With increasing threats to single authentication schemes, 2Factor and later multi-factor authentication approaches came into practice. Several studies… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 57 publications
0
4
0
Order By: Relevance
“…In [37], a bibliometric survey was performed based on Web of Science data for research publications on the topic of MFA. Furthermore, we summarize the use of MFA through a different number of factors for cloud computing environments in Table 1.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [37], a bibliometric survey was performed based on Web of Science data for research publications on the topic of MFA. Furthermore, we summarize the use of MFA through a different number of factors for cloud computing environments in Table 1.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Also, m$$ m $$ is the reference time indicating the location in the time domain signal, while ω$$ \omega $$ is the angular frequency. The w[n]$$ w\left[n\right] $$ is the analysis window function that is only non‐zero during the interval [0,N1]$$ \left[0,N-1\right] $$ and is used to divide x[n]$$ x\left[n\right] $$ into small chunks, The spectrogram is then calculated as, Spectrogram0.25em(m,ω)goodbreak=|STFTfalse{xfalse[nfalse]false}|2goodbreak=|Xfalse(m,ωfalse)|2$$ \mathrm{Spectrogram}\ \left(m,\omega \right)={\left| STFT\left\{x\left[n\right]\right\}\right|}^2={\left|X\Big(m,\omega \Big)\right|}^2 $$ where the energy is distributed and visualized in the form of heatmaps in the two‐dimensional time‐frequency plane 36 …”
Section: Preliminary Conceptsmentioning
confidence: 99%
“…Simple use of MFA mitigates phishing [12] and spear phishing [13] attacks those attacks provide a possibility to steal login and password but MFA/2FA tokens prevent this risk.…”
Section: Figure 2 Architecture Diagram Generation Hotpmentioning
confidence: 99%