2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2017
DOI: 10.23919/icitst.2017.8356383
|View full text |Cite
|
Sign up to set email alerts
|

Mobile multi-factor authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 2 publications
0
3
0
2
Order By: Relevance
“…Many research studies today require more than two factors to ensure that impersonation cannot be successful. The three-factor method is deployed using traditional factors including something you know, something you have , and something you are , and it has been indicated that something you have is automatic for mobile users because the something you have is always with the user (the mobile device itself) ( Bissada & Olmsted, 2017 ). Another study of blockchain-based e-voting on mobile devices recommends the use of the voter’s identification number (VIN), PIN, and OTP ( Abayomi-Zannu, Odun-Ayo & Barka, 2019 ).…”
Section: Related Workmentioning
confidence: 99%
“…Many research studies today require more than two factors to ensure that impersonation cannot be successful. The three-factor method is deployed using traditional factors including something you know, something you have , and something you are , and it has been indicated that something you have is automatic for mobile users because the something you have is always with the user (the mobile device itself) ( Bissada & Olmsted, 2017 ). Another study of blockchain-based e-voting on mobile devices recommends the use of the voter’s identification number (VIN), PIN, and OTP ( Abayomi-Zannu, Odun-Ayo & Barka, 2019 ).…”
Section: Related Workmentioning
confidence: 99%
“…Gambar 6. Evolusi Metode Authentication Dari SFA Ke MFA (Alizadeh, Hassan, & Khodadadi, 2015) E. Multi-Factor Authentication Multi-factor authentication (MFA) adalah sistem keamanan yang menggunakan lebih dari satu metode authentication dari kategori independent credentials untuk memverifikasi identitas pengguna untuk dapat login atau melakukan transaksi lainnya [14].…”
Section: User Authentication Konsep User Authenticationunclassified
“…Konsep Multi-Factor Authentication [14] Multi-factor authentication menggabungkan dua atau lebih independent credentials apa yang diketahui pengguna (kata sandi), apa yang dimiliki pengguna (security token), dan siapa penggunanya (biometric verification). Tujuan dari MFA adalah untuk menciptakan pertahanan berlapis dan membuatnya lebih sulit bagi orang yang tidak sah untuk mengakses target seperti lokasi fisik, perangkat komputasi, jaringan atau basis data [14]. Jika salah satu faktor dikompromikan atau rusak, penyerang masih memiliki setidaknya satu lagi penghalang untuk dilanggar sebelum berhasil membobol target.…”
Section: User Authentication Konsep User Authenticationunclassified
“…Knowledge factors: demands the user to illustrate Knowledge of hidden information. This may come in form of passwords, pins, and answers to a secret question and so on [5]. Possession factors are physical entities had by the user to client computer or university portal.…”
Section: Introductionmentioning
confidence: 99%