Information systems of critical infrastructure provide services on which the core functions of a state and its economy depend as well as welfare of society. Such systems are becoming an increasingly common target for crimes and attacks in cyberspace, as their vulnerabilities can be exploited for malicious activities seeking financial or political gain. One of the main reasons that threatens the security of these systems is the weak control of remote access, otherwise defined as management of a system’s user identity. Management of user identity depends on user authentication, authorization and the assignment of certain rights in the digital space. This paper provides the proposed two-factor (2FA) digital authentication method for remote acc...
IT systems rely on correct authentication of their users in order to provide confidentiality and int...
An appealing property to researchers, educators, and students is the openness of the physical enviro...
An appealing property to researchers, educators, and students is the openness of the physical enviro...
Security is one of the major issues in the existing era of modern communication system where the use...
Abstract: This paper analyzes the factors that affect the efficiency of a remote user’s authenticati...
In the publication multi factor authentication solutions are offered as a necessary tool for decreas...
In large-scale systems, user authentication usually needs the assistance from a remote central authe...
[[abstract]]In a multi-server environment, remote user authentication is essential for secure commun...
[[abstract]]Password authentication has been adopted as one of the most popular solutions in protect...
The article describes methods of user identification using authentication based on the second factor...
A three-factor authentication combines biometrics information with user password and smart card to p...
The article describes methods of user identification using authentication based on the second factor...
Abstract. A remote user authentication system has become an important part of security, along with c...
A three-factor authentication combines biometrics information with user password and smart card to p...
[[abstract]]"Remote user authentication is used to validate the legitimacy of a remote login user. C...
IT systems rely on correct authentication of their users in order to provide confidentiality and int...
An appealing property to researchers, educators, and students is the openness of the physical enviro...
An appealing property to researchers, educators, and students is the openness of the physical enviro...
Security is one of the major issues in the existing era of modern communication system where the use...
Abstract: This paper analyzes the factors that affect the efficiency of a remote user’s authenticati...
In the publication multi factor authentication solutions are offered as a necessary tool for decreas...
In large-scale systems, user authentication usually needs the assistance from a remote central authe...
[[abstract]]In a multi-server environment, remote user authentication is essential for secure commun...
[[abstract]]Password authentication has been adopted as one of the most popular solutions in protect...
The article describes methods of user identification using authentication based on the second factor...
A three-factor authentication combines biometrics information with user password and smart card to p...
The article describes methods of user identification using authentication based on the second factor...
Abstract. A remote user authentication system has become an important part of security, along with c...
A three-factor authentication combines biometrics information with user password and smart card to p...
[[abstract]]"Remote user authentication is used to validate the legitimacy of a remote login user. C...
IT systems rely on correct authentication of their users in order to provide confidentiality and int...
An appealing property to researchers, educators, and students is the openness of the physical enviro...
An appealing property to researchers, educators, and students is the openness of the physical enviro...