• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 517
Next 10 →

On the Usability of Two-Factor Authentication

by Ding Wang, Ping Wang
"... Abstract. Smart-card-based password authentication, known as two-factor authentication, is one of the most widely used security mechanisms to validate the legitimacy of a remote client, who must hold a valid smart card and the correct password in order to successfully login the server. So far the re ..."
Abstract - Add to MetaCart
Abstract. Smart-card-based password authentication, known as two-factor authentication, is one of the most widely used security mechanisms to validate the legitimacy of a remote client, who must hold a valid smart card and the correct password in order to successfully login the server. So far

Two-factor Authentication in Smartphones: Implementations and Attacks

by Christofer Ericson, Martin Hell Eit, Albert Altman, It Advisor , 2015
"... Two-factor authentication is the method of combining two so called authentication factors in order to enhance the security of user authentication. An authentication factor is defined as ”Something the user knows, has or is”. Something the user knows is often the traditional username and password, so ..."
Abstract - Add to MetaCart
Two-factor authentication is the method of combining two so called authentication factors in order to enhance the security of user authentication. An authentication factor is defined as ”Something the user knows, has or is”. Something the user knows is often the traditional username and password

Improved Two-Factor Authenticated Key Exchange Protocol

by Shuhua Wu, Yuefei Zhu , 2009
"... Abstract: Quite recently, two smart-card-based passwords authenticated key exchange protocols were proposed by Lee et al. and Hwang et al. respectively. However, neither of them achieves two-factor authentication fully since they would become completely insecure once one factor is broken. To overcom ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract: Quite recently, two smart-card-based passwords authenticated key exchange protocols were proposed by Lee et al. and Hwang et al. respectively. However, neither of them achieves two-factor authentication fully since they would become completely insecure once one factor is broken

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL

by Christopher Mann, Daniel Loebenberger , 2014
"... Abstract. We show how to realize two-factor authentication for a Bitcoin wal-let employing the two-party ECDSA signature protocol adapted from MacKen-zie & Reiter (2004). We also present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification ..."
Abstract - Add to MetaCart
Abstract. We show how to realize two-factor authentication for a Bitcoin wal-let employing the two-party ECDSA signature protocol adapted from MacKen-zie & Reiter (2004). We also present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

Analyzing two-factor authentication devices

by Anders Moen Hagalisletto
"... It is expected that mobile phones will be used in various e-commerce applications, since it is handy and frequently used. Another important aspect is that mobile phones approach computers both with respect to programmability and capacity. One example of a cutting edge application is a generic auth ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
authentication mechanism invented by a new Norwegian startup company: a mobile terminal is used as a password calculator that could potentially be used towards any Internet service provider. Yet, security protocols in general and authentication protocols in particular are vulnerable to attacks: The current

. THE IMPACT OF TWO-FACTOR AUTHENTICATION TECHNOLOGY ON THE ADOPTION OF INTERNET

by Joo Suk Han, Sherah Kurnia, Fei Peng
"... The security risks of Internet banking have always been a concern to the service providers and users. There has been a global trend to adopt a multi-factor authentication scheme to increase the security of Internet banking. However, the introduction of two-factor authentication has not been well rec ..."
Abstract - Add to MetaCart
The security risks of Internet banking have always been a concern to the service providers and users. There has been a global trend to adopt a multi-factor authentication scheme to increase the security of Internet banking. However, the introduction of two-factor authentication has not been well

Improving Mobile Money Security with Two-Factor Authentication

by Adam B. Mtaho
"... Security is a leading factor for establishing and maintaining customer trust in mobile money services (MMSs). MMSs in Tanzania rely on the use of Personal Identification Number (PIN) as an authentication method. However, a PIN can be easily guessed, forged or misused. This paper explores security ch ..."
Abstract - Add to MetaCart
challenges in MMSs and weaknesses associated with the current Mobile Money Authentication (MMA) method. Further, the study proposes the use of two-factor authentication model as an alternative method. The proposed model combines the current approach of using PIN and adds another layer of security that uses

A comparative usability study of two-factor authentication

by Emiliano De Cristofaro, Honglu Du, Julien Freudiger, Greg Norcie - In Proceedings of the Workshop on Usable Security (USEC , 2014
"... Abstract—Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires users ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract—Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires

Painless migration from passwords to two factor authentication

by Ziqing Mao , Dinei Florêncio , Cormac Herley - In 2011 IEEE International Workshop on Information Forensics and Security (WIFS , 2011
"... Abstract-In spite of growing frequency and sophistication of attacks two factor authentication schemes have seen very limited adoption in the US, and passwords remain the single factor of authentication for most bank and brokerage accounts. Clearly the cost benefit analysis is not as strongly in fa ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract-In spite of growing frequency and sophistication of attacks two factor authentication schemes have seen very limited adoption in the US, and passwords remain the single factor of authentication for most bank and brokerage accounts. Clearly the cost benefit analysis is not as strongly

EVALUATING THE PERFORMANCE OF TWO-FACTOR AUTHENTICATION SOLUTION IN THE BANKING SECTOR

by Olufemi Sunday Adeoye
"... Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known. In today’s corporate environment, the need exists to ensure that only authorized individuals or customers gain access to critical devices or services offered. This paper ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known. In today’s corporate environment, the need exists to ensure that only authorized individuals or customers gain access to critical devices or services offered
Next 10 →
Results 1 - 10 of 517
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University