Design and implementation of multi factor mechanism for secure authentication system
A secure network depends in part on user authentication and regrettably the authentication systems currently in use are not completely safe. However, the user is not the only party that needs to be authenticated to ensure the security of transactions on the Internet. Existing OTP mechanism cannot gu...
| Main Authors: | Hussein, Khalid Waleed, Mohd Sani, Nor Fazlida, Mahmod, Ramlan, Abdullah @ Selimun, Mohd Taufik |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJCSIS
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30636/ http://psasir.upm.edu.my/id/eprint/30636/1/Design%20and%20implementation%20of%20multi%20factor%20mechanism%20for%20secure%20authentication%20system.pdf |
Similar Items
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
Enhance luhn algorithm for validation of credit cards numbers.
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Enhance Luhn algorithm for validation of identity card numbers (ID card)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Plan recognition scheme using multi-factors authentication for smart card online system
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
An effective security alert mechanism for real-time phishing tweet detection on twitter
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024)
by: Roslan, Nuur Alifah, et al.
Published: (2024)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015)
by: Olalere, Morufu, et al.
Published: (2015)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
An improved secure authentication in lightweight IoT
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024)
by: Jaisan S M, Ashish
Published: (2024)
An investigation of the secure data communication in medical mobile applications
by: Aminnezhad, Asou, et al.
Published: (2015)
by: Aminnezhad, Asou, et al.
Published: (2015)
A Secured Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
Cellular automata based user authentication scheme using identity-bits commitment for wireless sensor network
by: Jamil, Norziana, et al.
Published: (2011)
by: Jamil, Norziana, et al.
Published: (2011)
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Similar Items
-
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013) -
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013) -
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016) -
Enhance luhn algorithm for validation of credit cards numbers.
by: Hussein, Khalid Waleed, et al.
Published: (2013) -
Enhance Luhn algorithm for validation of identity card numbers (ID card)
by: Hussein, Khalid Waleed, et al.
Published: (2013)