In today’s world, security plays an important role in many authentication applications. Modern era information sharing is boundless and becoming much easier to access with the introduction of the Internet and the World Wide Web. Although this can be considered as a good point, issues such as privacy and data integrity arise due to the lack of control and authority. For this reason the concept of data security was introduced. Data security can be categorized into two which are secrecy and authentication. This research in particular was focused on the authentication of data security. One popular scheme used for authentication security is the implementation of multi-factor authentication (MFA). There have been several researches which discuss...
Authentication is required in stored database systems so that only authorized users can access the d...
Abstract: Multifactor authentication (MFA) is one of the most secure authentication methods. It cove...
With the rapid development of personal information and wireless communication technology, user authe...
Authentication is one of the essentials components of information security. It has become one of the...
Authentication is one of the essentials components of information security. It has become one of the...
One of the most important parts in security is an authentication. It has become an essential securit...
Authentication is considered as a safeguard against all types of illegal access to any computing dev...
It is common knowledge that the average user has multiple online accounts which all require a passw...
Abstract — Single factor authentication such as password authentication is no longer considered as s...
In the publication multi factor authentication solutions are offered as a necessary tool for decreas...
Multifactor authentication (MFA) is a security system in which more than one form of authentication ...
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single...
Authentication is the fundamental defense against any illegitimate access to a computing device or a...
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enab...
This study presents the current state of research on multi-factor authentication. Authentication is ...
Authentication is required in stored database systems so that only authorized users can access the d...
Abstract: Multifactor authentication (MFA) is one of the most secure authentication methods. It cove...
With the rapid development of personal information and wireless communication technology, user authe...
Authentication is one of the essentials components of information security. It has become one of the...
Authentication is one of the essentials components of information security. It has become one of the...
One of the most important parts in security is an authentication. It has become an essential securit...
Authentication is considered as a safeguard against all types of illegal access to any computing dev...
It is common knowledge that the average user has multiple online accounts which all require a passw...
Abstract — Single factor authentication such as password authentication is no longer considered as s...
In the publication multi factor authentication solutions are offered as a necessary tool for decreas...
Multifactor authentication (MFA) is a security system in which more than one form of authentication ...
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single...
Authentication is the fundamental defense against any illegitimate access to a computing device or a...
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enab...
This study presents the current state of research on multi-factor authentication. Authentication is ...
Authentication is required in stored database systems so that only authorized users can access the d...
Abstract: Multifactor authentication (MFA) is one of the most secure authentication methods. It cove...
With the rapid development of personal information and wireless communication technology, user authe...