2021 National Computing Colleges Conference (NCCC) 2021
DOI: 10.1109/nccc49330.2021.9428806
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Factor Authentication to Systems Login

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Based on the findings shown in Table 5, it is evident that every one of the reviewed methods, except for references [28,34,36,37,40,41,43,48,50], is capable of resisting direct observation SSAs. All of the methods that were examined, with the exception of [33], were unable to withstand video-recorded and multiple-observation SSAs.…”
Section: Rq4: How Effective Are the Selected Recognition-based Method...mentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the findings shown in Table 5, it is evident that every one of the reviewed methods, except for references [28,34,36,37,40,41,43,48,50], is capable of resisting direct observation SSAs. All of the methods that were examined, with the exception of [33], were unable to withstand video-recorded and multiple-observation SSAs.…”
Section: Rq4: How Effective Are the Selected Recognition-based Method...mentioning
confidence: 99%
“…As a result of this, the attackers are unable to determine whether the image that was clicked was the decoy image or the registered image. In the cases of [32,33,[35][36][37][44][45][46]48,52,53], the registered icons and the decoy icons are not clicked. Consequently, it would be difficult for the attackers to make any intelligent analysis to distinguish which icons are the registered icons and which are the decoys.…”
Section: Rq2 What Pass-objects Are Used For Authentication In These M...mentioning
confidence: 99%
“…Nearly no new approaches or schemes on GP for web apps were done between 2016 and 2020, and researchers preferred to use GP in cloud computing and mobile computing instead [18][19][20][21][22][23][24]. They tended to improve the GP for cloud services and web applications start in 2020 [1,18,19,[22][23][24][25][26][27][28][29].…”
Section: Related Workmentioning
confidence: 99%
“…i) simple password; ii) graphical password; iii) Biometric password; iv)third-party authentication; v)3D password object [18]. According to a survey done on users authenticated by all five levels of authentication, they sent their views on They observed that when using a multi-level password, it increases the password security and reduces password breaking, but it also increases the user's frustration [18,19,27,28 ]. The 3D password object and third party are not supported on it, and the biometric isn't preferred because of the user's personal characteristics changing [19,26].…”
Section: Related Workmentioning
confidence: 99%
“…No one wants to face stealing identity or some private information like accounting, financial, personal (PII), or health data. [1,2] Usually, users don't want to memorize small secrets (in this context we mean passwords) and try to write them on stickers and place them on their monitor.…”
Section: Introductionmentioning
confidence: 99%