A Pattern-Based Multi-Factor Authentication System

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-Factor Authentication: A Survey †

Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) st...

متن کامل

PassPattern System (PPS): A Pattern-Based User Authentication Scheme

Authenticating a user online, without compromising the user comfort is an important issue. The most popular approach to authenticate a user online is Password-based authentication. Studies show that, users (always) choose very simple passwords which are often easy to guess. On the contrary, randomly generated strings are difficult to remember, especially if the user is having many passwords. In...

متن کامل

A Multi - agent Pattern Based Timetabling System

The “Academic Timetabling System” is a research project that has been funded by the deanship of scientific research of Tabuk University. The project aims at developing and implementing an academic time tabling system for Tabuk University that is based on MultiAgent technology. In this paper we introduce the “Academic Time Tabling System” that has been designed and implemented in Tabuk Universit...

متن کامل

Multi-Application Authentication Based on Multi-Agent System

This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infrastructure (PKI) authentication scheme and the multi-agent technique. A key pair and a certificate issued by the Certification Authority (CA) are normally kept in a smart card or a token in order to enforce two-factor authe...

متن کامل

Multi-Factor Authentication and Authorization using Attribute Based Identification

Access control (authentication, authorization, and verification) is the most frequently occurring security action in the electric sector, and a multi-factor technique is recommended as one of the most promising solutions. However, the technique, despite its huge potential, has been underutilized with limitations, e.g., applied only to authentication and requiring human presence for fingerprinti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Scalable Computing: Practice and Experience

سال: 2019

ISSN: 1895-1767

DOI: 10.12694/scpe.v20i1.1460