A Pattern-Based Multi-Factor Authentication System
نویسندگان
چکیده
منابع مشابه
Multi-Factor Authentication: A Survey †
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) st...
متن کاملPassPattern System (PPS): A Pattern-Based User Authentication Scheme
Authenticating a user online, without compromising the user comfort is an important issue. The most popular approach to authenticate a user online is Password-based authentication. Studies show that, users (always) choose very simple passwords which are often easy to guess. On the contrary, randomly generated strings are difficult to remember, especially if the user is having many passwords. In...
متن کاملA Multi - agent Pattern Based Timetabling System
The “Academic Timetabling System” is a research project that has been funded by the deanship of scientific research of Tabuk University. The project aims at developing and implementing an academic time tabling system for Tabuk University that is based on MultiAgent technology. In this paper we introduce the “Academic Time Tabling System” that has been designed and implemented in Tabuk Universit...
متن کاملMulti-Application Authentication Based on Multi-Agent System
This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infrastructure (PKI) authentication scheme and the multi-agent technique. A key pair and a certificate issued by the Certification Authority (CA) are normally kept in a smart card or a token in order to enforce two-factor authe...
متن کاملMulti-Factor Authentication and Authorization using Attribute Based Identification
Access control (authentication, authorization, and verification) is the most frequently occurring security action in the electric sector, and a multi-factor technique is recommended as one of the most promising solutions. However, the technique, despite its huge potential, has been underutilized with limitations, e.g., applied only to authentication and requiring human presence for fingerprinti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scalable Computing: Practice and Experience
سال: 2019
ISSN: 1895-1767
DOI: 10.12694/scpe.v20i1.1460