2017
DOI: 10.1007/978-3-319-58808-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Factor Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(26 citation statements)
references
References 1 publication
0
23
0
Order By: Relevance
“…The user just enters username and password to access the information on that website. Especially, medium and small websites do not have a budget to use TLS or multi-factor authentication services [19], such as OTP, biometric, token, etc. This makes the websites possibly insecure, and there is a high risk of being hacked [20,21].…”
Section: Proposed Methodsmentioning
confidence: 99%
“…The user just enters username and password to access the information on that website. Especially, medium and small websites do not have a budget to use TLS or multi-factor authentication services [19], such as OTP, biometric, token, etc. This makes the websites possibly insecure, and there is a high risk of being hacked [20,21].…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Identity theft is the fastest growing crime in recent years. Currently, password-based credentials are the most used by user authentication mechanisms, despite of their weaknesses [160]. There are multiple opportunities for impersonation and other attacks that fraudulently claim another subject's identity [161].…”
Section: Authenticationmentioning
confidence: 99%
“…The challenges faced by authentication and authorisation, as well as solutions proposed by works presented above are listed in Table 3. (Bhatti et al 2004;Lima et al 2011; Govindan and Mohapatra 2012) Authentication for critical services (Aloul et al 2009) Multi-factor authentication for MANETs (Glynos et al 2005;Govindan and Mohapatra 2012) Privacy-preserving multifactor authentication (Bhargav-Spantzel et al 2017) Multi-factor authentication for pervasive environments (Ren and Lou 2007;Mayrhofer 2006;Mayrhofer and Gellersen 2007;Banyal et al 2013) Multi-factor authentication for fragile communication (Holbein and Teufel 1995;Bardram et al 2003;Kindberg et al 2002;Hulsebosch et al 2005;Mayrhofer and Gellersen 2007;Ren and Lou 2007;Lenzini 2009;Hayashi et al 2013;Primo et al 2014) Authorisation over constrained channels (Kindberg and Zhang 2001;Kindberg et al 2002) Survey (Dasgupta et al 2017) Context-aided intrusion detection (Fraunholz et al 2017a;Fraunholz et al 2017b;Fraunholz et al 2017c; Duque Anton et al…”
Section: Related Workmentioning
confidence: 99%