Results 1 - 10
of
517
On the Usability of Two-Factor Authentication
"... Abstract. Smart-card-based password authentication, known as two-factor authentication, is one of the most widely used security mechanisms to validate the legitimacy of a remote client, who must hold a valid smart card and the correct password in order to successfully login the server. So far the re ..."
Abstract
- Add to MetaCart
Abstract. Smart-card-based password authentication, known as two-factor authentication, is one of the most widely used security mechanisms to validate the legitimacy of a remote client, who must hold a valid smart card and the correct password in order to successfully login the server. So far
Two-factor Authentication in Smartphones: Implementations and Attacks
, 2015
"... Two-factor authentication is the method of combining two so called authentication factors in order to enhance the security of user authentication. An authentication factor is defined as ”Something the user knows, has or is”. Something the user knows is often the traditional username and password, so ..."
Abstract
- Add to MetaCart
Two-factor authentication is the method of combining two so called authentication factors in order to enhance the security of user authentication. An authentication factor is defined as ”Something the user knows, has or is”. Something the user knows is often the traditional username and password
Improved Two-Factor Authenticated Key Exchange Protocol
, 2009
"... Abstract: Quite recently, two smart-card-based passwords authenticated key exchange protocols were proposed by Lee et al. and Hwang et al. respectively. However, neither of them achieves two-factor authentication fully since they would become completely insecure once one factor is broken. To overcom ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract: Quite recently, two smart-card-based passwords authenticated key exchange protocols were proposed by Lee et al. and Hwang et al. respectively. However, neither of them achieves two-factor authentication fully since they would become completely insecure once one factor is broken
REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL
, 2014
"... Abstract. We show how to realize two-factor authentication for a Bitcoin wal-let employing the two-party ECDSA signature protocol adapted from MacKen-zie & Reiter (2004). We also present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification ..."
Abstract
- Add to MetaCart
Abstract. We show how to realize two-factor authentication for a Bitcoin wal-let employing the two-party ECDSA signature protocol adapted from MacKen-zie & Reiter (2004). We also present a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification
Analyzing two-factor authentication devices
"... It is expected that mobile phones will be used in various e-commerce applications, since it is handy and frequently used. Another important aspect is that mobile phones approach computers both with respect to programmability and capacity. One example of a cutting edge application is a generic auth ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
authentication mechanism invented by a new Norwegian startup company: a mobile terminal is used as a password calculator that could potentially be used towards any Internet service provider. Yet, security protocols in general and authentication protocols in particular are vulnerable to attacks: The current
. THE IMPACT OF TWO-FACTOR AUTHENTICATION TECHNOLOGY ON THE ADOPTION OF INTERNET
"... The security risks of Internet banking have always been a concern to the service providers and users. There has been a global trend to adopt a multi-factor authentication scheme to increase the security of Internet banking. However, the introduction of two-factor authentication has not been well rec ..."
Abstract
- Add to MetaCart
The security risks of Internet banking have always been a concern to the service providers and users. There has been a global trend to adopt a multi-factor authentication scheme to increase the security of Internet banking. However, the introduction of two-factor authentication has not been well
Improving Mobile Money Security with Two-Factor Authentication
"... Security is a leading factor for establishing and maintaining customer trust in mobile money services (MMSs). MMSs in Tanzania rely on the use of Personal Identification Number (PIN) as an authentication method. However, a PIN can be easily guessed, forged or misused. This paper explores security ch ..."
Abstract
- Add to MetaCart
challenges in MMSs and weaknesses associated with the current Mobile Money Authentication (MMA) method. Further, the study proposes the use of two-factor authentication model as an alternative method. The proposed model combines the current approach of using PIN and adds another layer of security that uses
A comparative usability study of two-factor authentication
- In Proceedings of the Workshop on Usable Security (USEC
, 2014
"... Abstract—Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires users ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract—Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires
Painless migration from passwords to two factor authentication
- In 2011 IEEE International Workshop on Information Forensics and Security (WIFS
, 2011
"... Abstract-In spite of growing frequency and sophistication of attacks two factor authentication schemes have seen very limited adoption in the US, and passwords remain the single factor of authentication for most bank and brokerage accounts. Clearly the cost benefit analysis is not as strongly in fa ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract-In spite of growing frequency and sophistication of attacks two factor authentication schemes have seen very limited adoption in the US, and passwords remain the single factor of authentication for most bank and brokerage accounts. Clearly the cost benefit analysis is not as strongly
EVALUATING THE PERFORMANCE OF TWO-FACTOR AUTHENTICATION SOLUTION IN THE BANKING SECTOR
"... Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known. In today’s corporate environment, the need exists to ensure that only authorized individuals or customers gain access to critical devices or services offered. This paper ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known. In today’s corporate environment, the need exists to ensure that only authorized individuals or customers gain access to critical devices or services offered
Results 1 - 10
of
517