The article describes methods of user identification using authentication based on the second factor. Known algorithms and protocols for two-factor authentication are considered. An algorithm is proposed using mobile devices as identifiers and generating a temporary password based on the hash function of encryption standards. For an automated control system, a two-factor authentication model and a sequential algorithm for generating a temporary password using functions have been developed. The implementation of the system is based on the Node.js software platform using the JavaScript programming language, as well as frameworks and connected system libraries. MongoDB, an open source database management system for information storage and proc...
Computer security is a field of computer science concerned with the control of risks related to comp...
<p>Passwords are the most common form of user authentication today. When passwords were first introd...
The verification of a person’s identity is very important in today’s information society, especially...
The article describes methods of user identification using authentication based on the second factor...
The ever increasing use of internet around the world has without doubt increased the usage of intern...
With the establishment of the information society, security had become the greatest concern for Inst...
Authentication is a process of verifying the credibility of a user who is trying to access classifie...
Autentifikacija je proces određivanja identiteta nekog subjekta, najčešće se odnosi na fizičku osobu...
This article aims to present some specific methodological features with using a Qualified Electronic...
Today, single-factor authentication, e.g. Passwords, is no longer considered secure on the cyberspac...
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enab...
The relevance of research. Authentication is the process of confirming the authenticity of an object...
Information systems of critical infrastructure provide services on which the core functions of a sta...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
Two technology trends – a move toward software defined capabilities and toward networked devices – s...
Computer security is a field of computer science concerned with the control of risks related to comp...
<p>Passwords are the most common form of user authentication today. When passwords were first introd...
The verification of a person’s identity is very important in today’s information society, especially...
The article describes methods of user identification using authentication based on the second factor...
The ever increasing use of internet around the world has without doubt increased the usage of intern...
With the establishment of the information society, security had become the greatest concern for Inst...
Authentication is a process of verifying the credibility of a user who is trying to access classifie...
Autentifikacija je proces određivanja identiteta nekog subjekta, najčešće se odnosi na fizičku osobu...
This article aims to present some specific methodological features with using a Qualified Electronic...
Today, single-factor authentication, e.g. Passwords, is no longer considered secure on the cyberspac...
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enab...
The relevance of research. Authentication is the process of confirming the authenticity of an object...
Information systems of critical infrastructure provide services on which the core functions of a sta...
Abstract: Authentication is an essential part of network security. It is a process of confirming the...
Two technology trends – a move toward software defined capabilities and toward networked devices – s...
Computer security is a field of computer science concerned with the control of risks related to comp...
<p>Passwords are the most common form of user authentication today. When passwords were first introd...
The verification of a person’s identity is very important in today’s information society, especially...