2022
DOI: 10.32523/2616-7263-2022-140-3-114-124
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication

R. Safin,
A. Abdiraman,
A. Nurusheva
et al.

Abstract: Sensitive information was always one of the big trade-offs we always exchange big secrets for small ones. On one hand, memorization of small secrets on the other hand tons of services requires a dedicated secret for each one. And when one of the services will be compromised it affects all services with the same password and credential. The main purpose of this article is to discuss multiple factors and increase security trade-offs differently. We will try to compare MFA (Multi-Factor Authentication), 2FA (Two … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 12 publications
0
0
0
Order By: Relevance