Access to Network Login by Three-Factor Authentication for Effective Information Security

@article{Vaithyasubramanian2016AccessTN,
  title={Access to Network Login by Three-Factor Authentication for Effective Information Security},
  author={S. Vaithyasubramanian and A. Christy and D. Saravanan},
  journal={The Scientific World Journal},
  year={2016},
  volume={2016}
}
Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable… Expand
2 Citations

References

SHOWING 1-10 OF 24 REFERENCES
Painless migration from passwords to two factor authentication
Choosing passwords: security and human factors
  • E. Gehringer
  • Computer Science
  • IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)
  • 2002
A Scheme to Create Secured Random Password Using Markov Chain
Universal Multi-Factor Authentication Using Graphical Passwords
...
1
2
3
...