Filters








24,584 Hits in 3.8 sec

Two-Factor Authentication with End-to-End Password Security [chapter]

Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device.  ...  Security is end-to-end" in the sense that the attacker can attack all parts of the system, including all communication links and any subset of parties (servers, devices, client terminals), can learn users  ...  TFA Security Model with End-to-End Security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-76581-5_15">doi:10.1007/978-3-319-76581-5_15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/45ip4zwpqjb7vjrpbz2aiwmpmy">fatcat:45ip4zwpqjb7vjrpbz2aiwmpmy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190222020855/http://pdfs.semanticscholar.org/377b/8c2e9a7a09a5d8dc7f84209392b6162acd0c.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/37/7b/377b8c2e9a7a09a5d8dc7f84209392b6162acd0c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-76581-5_15"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Security Enhancement Using Two-Server Model
English

Anshu Malhotra, Animesh Sit, Neeraj Dubey, Abhinav Tyagi, Pranav Bhatia
<span title="2014-12-30">2014</span> <i title="Ess &amp; Ess Research Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vzhjis6iijfe5gwwloxj4ecjr4" style="color: black;">International Journal of Innovative Research in Computer and Communication Engineering</a> </i> &nbsp;
Like in our system, only a front-end service server interacts directly with the users while a control server which does not interact with the user remains behind the scene; therefore, it can be directly  ...  So, to address this problem we may use multiple servers to store a single user password. In this paper we present the technique of using two servers for storing the encrypted password.  ...  We are using a two server based password authentication system which is effective as well as easier to implement. Here we are using the two servers namely front end server and back end server.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15680/ijircce.2014.0212007">doi:10.15680/ijircce.2014.0212007</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fvrhxjaksvf2deybqs7ovmltz4">fatcat:fvrhxjaksvf2deybqs7ovmltz4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602052453/http://www.ijircce.com/upload/2014/december/10_SECURITY.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4d/d0/4dd090afa692834f64e23371a63c349c0a30ba12.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15680/ijircce.2014.0212007"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Authentication Systems in Internet of Things [article]

Tuhin Borgohain, Amardeep Borgohain, Uday Kumar, Sugata Sanyal
<span title="2015-02-03">2015</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials.  ...  This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials.  ...  Two-factor authentication or 2FA is a way of login where a user is required to provide additional information to sign in than just the password.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1502.00870v1">arXiv:1502.00870v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cbebdfqopfd45epf6uwf2imygi">fatcat:cbebdfqopfd45epf6uwf2imygi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200824030141/https://arxiv.org/ftp/arxiv/papers/1502/1502.00870.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dc/13/dc1365f3286f3c49e06d283ff2a4db3773c6babf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1502.00870v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Password Authentication from a Human Factors Perspective: Results of a Survey among End-Users

Peter Hoonakker, Nis Bornoe, Pascale Carayon
<span title="">2009</span> <i title="SAGE Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/libgwrmsi5afpkhv5lhu62b25y" style="color: black;">Proceedings of the Human Factors and Ergonomics Society Annual Meeting</a> </i> &nbsp;
In this study, using a large questionnaire survey among endusers, we examine password behavior of end-users.  ...  Only recently, the role of human factors in CIS has been recognized. End-user behavior can increase the vulnerability of computer and information systems.  ...  ACKNOWLEDGEMENTS This study was made possible with a grant from the National Science Foundation. Grant number: CNS-0627682 (PI: Pascale Carayon).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1177/154193120905300605">doi:10.1177/154193120905300605</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ldq7qx3jkvh25bfljrzou5pdvm">fatcat:ldq7qx3jkvh25bfljrzou5pdvm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120816104644/http://www.hfes.org:80/web/Newsroom/HFES09-Hoonaker-CIS.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/17/59/175935148782ec6672389fca1c98a3d8c1c1ee10.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1177/154193120905300605"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> sagepub.com </button> </a>

Password Authentication from a Human Factors Perspective: Results of a Survey among End-Users

Peter Hoonakker, Nis Bornoe, Pascale Carayon
<span title="2009-09-19">2009</span> <i title="SAGE Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/libgwrmsi5afpkhv5lhu62b25y" style="color: black;">Proceedings of the Human Factors and Ergonomics Society Annual Meeting</a> </i> &nbsp;
In this study, using a large questionnaire survey among endusers, we examine password behavior of end-users.  ...  Only recently, the role of human factors in CIS has been recognized. End-user behavior can increase the vulnerability of computer and information systems.  ...  ACKNOWLEDGEMENTS This study was made possible with a grant from the National Science Foundation. Grant number: CNS-0627682 (PI: Pascale Carayon).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1518/107118109x12524441081983">doi:10.1518/107118109x12524441081983</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/liiygte6ujfz7lmnq4ddnefp4u">fatcat:liiygte6ujfz7lmnq4ddnefp4u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808234014/http://www.bornoe.org/papers/HFES09-Hoonaker-CIS.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/01/cf/01cf55f162e70544396223bd88c5f2fb8dfab43b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1518/107118109x12524441081983"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

An Unified Approach by Implementing the Secured Authentication Protocol Scheme in Wireless Sensor Networks

R Sujatha, M Lawanya
<span title="">2014</span> <i title="Pak Publishing Group"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vezny52vzrf4jlxnyttnd4ct2i" style="color: black;">Review of Information Engineering and Applications</a> </i> &nbsp;
Therefore, security with key distribution is a good factor considered in wireless sensor network communications.  ...  Major threats are viewed and addressed with the dynamic password system. With this dynamic methodology hacking of text-based password is not feasible.  ...  There are generally two motives for taking this combined action:  To improve usability and accuracy, combining items from different authenticating factors improves the accuracy of the authentication  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18488/journal.79/2014.1.1/79.1.24.38">doi:10.18488/journal.79/2014.1.1/79.1.24.38</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wkzphubbnnh2nbrosyqwqhypsi">fatcat:wkzphubbnnh2nbrosyqwqhypsi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428021948/http://www.conscientiabeam.com/pdf-files/com/79/RIEA-2014-1(1)-24-38.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/00/09/0009e6d8ce2e63caf4e34d04c9df1947433abe77.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18488/journal.79/2014.1.1/79.1.24.38"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Passwords: If We're So Smart, Why Are We Still Using Them? [chapter]

Cormac Herley, P. C. van Oorschot, Andrew S. Patrick
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Passwords remain the dominant means of authentication on the Internet, even in the face of significant problems related to password forgetting and theft.  ...  Will alphanumeric passwords still be ubiquitous in 2019, or will adoption of alternative proposals be commonplace? What must happen in order to move beyond passwords?  ...  The second author acknowledges NSERC funding of his Canada Research Chair in Network and Software Security, an NSERC Discovery Grant, and NSERC ISSNet.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-03549-4_14">doi:10.1007/978-3-642-03549-4_14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/b6pjzxqyljfdtgzvjro64n7jmi">fatcat:b6pjzxqyljfdtgzvjro64n7jmi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090709134757/http://www.scs.carleton.ca/~paulv/papers/fc09.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/25/4d/254d75c7b813201c38a69c1d12339845522f0af0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-03549-4_14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Loc-Auth: Location-enabled authentication through attribute-based encryption

Marcos Portnoi, Chien-Chung Shen
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7vbu3ysrizfp5mhftcenfdvn7a" style="color: black;">2015 International Conference on Computing, Networking and Communications (ICNC)</a> </i> &nbsp;
Two-factor authentication aids in the security, even though, as a side effect, might worsen user experience.  ...  Traditional user authentication involves entering a username and password into a system. Strong authentication security demands, among other requirements, long, frequently hard-to-remember passwords.  ...  To complete the access, the end-user may supply the final authentication factor, such as a simplified, short password to nearby terminals or devices.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iccnc.2015.7069321">doi:10.1109/iccnc.2015.7069321</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iccnc/PortnoiS15.html">dblp:conf/iccnc/PortnoiS15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y5klxc6ujrbw5gq2jn4jrxjvsm">fatcat:y5klxc6ujrbw5gq2jn4jrxjvsm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200901210915/https://arxiv.org/vc/arxiv/papers/1410/1410.0983v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0b/ba/0bba3b1ff1a801673216fe1f6a4a58d1acd7bbec.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iccnc.2015.7069321"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Transparent password policies: A case study of investigating end-user situational awareness

Alberto Bullo, Eliana Stavrou, Stavros Stavrou
<span title="2017-11-18">2017</span> <i title="Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tv7rpjel4vb2zl7vigv7trkpt4" style="color: black;">International Journal on Cyber Situational Awareness</a> </i> &nbsp;
However, authentication transparency can challenge security and usability and can impact the awareness of the end-users with regards to the protection level that is realistically achieved.  ...  Transparent password policies are utilized by organizations in an effort to ease the end-user (e.g. customer) from the burden of configuring authentication settings while maintaining a high level of security  ...  The human factor (Sasse and Flechais, 2005 ) plays a crucial role in user authentication. Often, the human factor is considered the weakest link with regards to security and password creation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22619/ijcsa.2017.100116">doi:10.22619/ijcsa.2017.100116</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2ilex57wqzaaxfkuxkt2wrf3wu">fatcat:2ilex57wqzaaxfkuxkt2wrf3wu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719134703/http://clok.uclan.ac.uk/22050/8/22050%20article16vol2no12017.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d8/16/d8160a772ffe119fa6eb3e33bc057ac5a58a8a05.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22619/ijcsa.2017.100116"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

AAAA: SSO and MFA Implementation in Multi-Cloud to Mitigate Rising Threats and Concerns Related to User Metadata

Muhammad Iftikhar Hussain, Jingsha He, Nafei Zhu, Fahad Sabah, Zulfiqar Ali Zardari, Saqib Hussain, Fahad Razque
<span title="2021-03-27">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/smrngspzhzce7dy6ofycrfxbim" style="color: black;">Applied Sciences</a> </i> &nbsp;
Single sign-on (SSO) and multifactor authentication (MFA) are deployed to get authentication, authorization, accountability, and availability (AAAA) to ensure the security and confidentiality of the end  ...  In this research, we have proposed a completely secure scheme to mitigate multiple authentications usually required from a particular user.  ...  MFA requires two or more factors in a transaction to complete a security check. One factor the user knows (e.g., a phrase, ID, or password).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app11073012">doi:10.3390/app11073012</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/acabdfynwfel3dj3zp2m5hxagm">fatcat:acabdfynwfel3dj3zp2m5hxagm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210409110342/https://res.mdpi.com/d_attachment/applsci/applsci-11-03012/article_deploy/applsci-11-03012-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/51/c6/51c64202207c9592c6a04cddbcf32e0625d04909.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app11073012"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Internet Banking Login with Multi-Factor Authentication

<span title="2016-01-31">2016</span> <i title="Korean Society for Internet Information (KSII)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hupfbobgkvepdnt5g32qxkypsy" style="color: black;">KSII Transactions on Internet and Information Systems</a> </i> &nbsp;
These factors can be categorised into two groups: short term and long term.  ...  This research designs and develops a multi-factor authentication protocol, starting from a registration system, which generates authentication factors, to an actual authentication mechanism.  ...  Even though the analysis showed that there is a limitation to the proposed protocol, especially the risk of password reuse, it is still believed that the proposed multi-factor authentication protocol is  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2017.01.027">doi:10.3837/tiis.2017.01.027</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2xzgovwv25gejlml2tpwycsdau">fatcat:2xzgovwv25gejlml2tpwycsdau</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220228014144/http://itiis.org/digital-library/manuscript/file/21343/TIISVol11No1-27.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/99/27/9927d72fd255c172236a971b00c1f887786e80bc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2017.01.027"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Securing the Next Generation

Wu-chang Feng, Bob Liebman, Ellie Harmon, Veronica Hotton, Michael Lupro, Lois Delcambre
<span title="2020-02-26">2020</span> <i title="ACM"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/42mrbbmjbfdtbbepad2fzixmum" style="color: black;">Proceedings of the 51st ACM Technical Symposium on Computer Science Education</a> </i> &nbsp;
Weak authentication practices that rely on passwords for security have led to widespread data breaches and successful phishing attacks.  ...  Towards this end, we describe a curriculum to teach high-school students the perils of passwords and a program to distribute hardware security tokens to them as they are first setting up their on-line  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author and do not necessarily reflect the views of the National Science Foundation or the National Security  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3328778.3372665">doi:10.1145/3328778.3372665</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sigcse/FengLHHLD20.html">dblp:conf/sigcse/FengLHHLD20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uql3w74favbebn4effgo336i6a">fatcat:uql3w74favbebn4effgo336i6a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201106031610/https://pdxscholar.library.pdx.edu/cgi/viewcontent.cgi?article=1085&amp;context=studies_fac" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ff/16/ff161d4dd1bc62e8fff4100d05ad33aef2680ca0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3328778.3372665"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

GTmoPass

Mohamed Khamis, Regina Hasholzner, Andreas Bulling, Florian Alt
<span title="">2017</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dxekjjblvfchlg6ao6esj3r37a" style="color: black;">Proceedings of the 6th ACM International Symposium on Pervasive Displays - PerDis &#39;17</a> </i> &nbsp;
The second factor is a possession-factor: users utilize their personal mobile devices, on which they enter the password. Credentials are securely transmitted to a server via Bluetooth beacons.  ...  To address this problem we propose GTmoPass, an authentication architecture that enables Multi-factor user authentication on public displays.  ...  In case of conditions GazeStart and GazeEnd, participants entered two passwords with one gaze input at the start/end of the password, while the other two passwords had two gaze inputs at the start/end  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3078810.3078815">doi:10.1145/3078810.3078815</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/perdis/KhamisHBA17.html">dblp:conf/perdis/KhamisHBA17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/erwfxklm4rd67hxpvqwhbhnyta">fatcat:erwfxklm4rd67hxpvqwhbhnyta</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428053504/http://eprints.gla.ac.uk/170220/1/170220.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/67/10/67108358236d8a7c421975f59b13201145005838.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3078810.3078815"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

COMPARISON OF DATA SECURITY IN GRID AND CLOUD COMPUTING

Harmeet Kaur .
<span title="2013-09-25">2013</span> <i title="eSAT Publishing House"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/m4rdj3kwwfcbvfzkv6kcnagwtm" style="color: black;">International Journal of Research in Engineering and Technology</a> </i> &nbsp;
For an increased level of security, privacy and password protection, we provide a new strong authentication model named "Two factor authentications using graphical password with pass point scheme".  ...  Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud's users and organizations with an agreement known SLA.  ...  My deepest gratitude to my supervisor, Dr. R K Bansal (Research Dean of Guru Kashi University) whose ceaseless support, encouragement, and flexibility I shall never forget.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15623/ijret.2013.0209022">doi:10.15623/ijret.2013.0209022</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/frdurjhobjh3pexdoisrp2v6we">fatcat:frdurjhobjh3pexdoisrp2v6we</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812033042/http://esatjournals.net/ijret/2013v02/i09/IJRET20130209022.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f2/3d/f23d922ac24b214fdbafc934dba25c0d350f4a38.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15623/ijret.2013.0209022"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication

Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, Sven Bugiel
<span title="">2020</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/inod5dqjxfdj3bnjykkklcg7d4" style="color: black;">2020 IEEE Symposium on Security and Privacy (SP)</a> </i> &nbsp;
Our results show that users are willing to accept a direct replacement of text-based passwords with a security key for single-factor authentication.  ...  This paper presents the first large-scale lab study of FIDO2 single-factor authentication to collect insights about end-users' perception, acceptance, and concerns about passwordless authentication.  ...  Finally, we like to thank Roman Tabachnikov for his work on the Fakebook and Schmoogle setups.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sp40000.2020.00047">doi:10.1109/sp40000.2020.00047</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sp/LyastaniSN0B20.html">dblp:conf/sp/LyastaniSN0B20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mj3qy2n4ovau5fuevpmm5tursy">fatcat:mj3qy2n4ovau5fuevpmm5tursy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211118214607/https://ieeexplore.ieee.org/ielx7/9144328/9152199/09152694.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/60/22/60225c4e7d531e5ff474ee8db511ee6360264051.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sp40000.2020.00047"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 24,584 results