2018
DOI: 10.3390/cryptography2010001
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
97
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 210 publications
(98 citation statements)
references
References 163 publications
(146 reference statements)
0
97
0
1
Order By: Relevance
“…The quantitative gains highly depend on the input parameters and reach 10 4 vs. 10 8 when 7 factors are combined. This example also highlights the importance of a threshold value selection, since incorrect combining may often result in rapid system performance degradation [10]. The same holds true for any other values of FAR/FRR, even though they may actually vary for different factors.…”
Section: B Means To Combinementioning
confidence: 70%
“…The quantitative gains highly depend on the input parameters and reach 10 4 vs. 10 8 when 7 factors are combined. This example also highlights the importance of a threshold value selection, since incorrect combining may often result in rapid system performance degradation [10]. The same holds true for any other values of FAR/FRR, even though they may actually vary for different factors.…”
Section: B Means To Combinementioning
confidence: 70%
“…Currently, MFA is considered a vital part in many fields in the information technology world and is involved in processes such as validating the identity of the administrator of the system, IoT devices, and smart mobile devices (see Figure 2). In recent years, Two-Factor Authentication (2FA) [12][13][14] was presented for use of a second factor-such as an SMS token, token device, smart card, and biometric with the user's account information-for resisting malicious attacks and solving the memorizing issue in password complexity [15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Currently, MFA is considered a vital part in many fields in the information technology world and is involved in processes such as validating the identity of the administrator of the system, IoT devices, and smart mobile devices (see Figure 2). The major advantage for using MFA schemes is to increase security level-"assume an adversary can get user's password by applying malicious attacks but he faces difficulties to retrieve information of another factor" [17]. Furthermore, some MFA schemes use a token device that does not need coverage for a mobile network or the Internet.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations