Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,539 papers from all fields of science
Search
Sign In
Create Free Account
Multi-factor authentication
Known as:
2 step verification
, Two factor
, Soft token
Expand
Multi-factor authentication (MFA) is a method of computer access control in which a user is only granted access after successfully presenting several…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
Access control
Authentication
Authentication server
Bastion host
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications
A. Ometov
,
Vitaly Petrov
,
S. Bezzateev
,
Sergey D. Andreev
,
Y. Koucheryavy
,
M. Gerla
IEEE Network
2019
Corpus ID: 90263635
The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have…
Expand
Highly Cited
2017
Highly Cited
2017
Secure multi‐factor remote user authentication scheme for Internet of Things environments
P. Dhillon
,
S. Kalra
International Journal of Communication Systems
2017
Corpus ID: 41494050
Because of the exponential growth of Internet of Things (IoT), several services are being developed. These services can be…
Expand
Highly Cited
2009
Highly Cited
2009
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
Han-Cheng Hsiang
,
W. Shih
Comput. Stand. Interfaces
2009
Corpus ID: 12868320
Highly Cited
2008
Highly Cited
2008
FPGA Realization of FIR Filters by Efficient and Flexible Systolization Using Distributed Arithmetic
P. Meher
,
S. Chandrasekaran
,
A. Amira
IEEE Transactions on Signal Processing
2008
Corpus ID: 14025696
In this paper, we present the design optimization of one- and two-dimensional fully pipelined computing structures for area-delay…
Expand
Highly Cited
2008
Highly Cited
2008
Universal Multi-Factor Authentication Using Graphical Passwords
A. P. Sabzevar
,
A. Stavrou
IEEE International Conference on Signal Image…
2008
Corpus ID: 2258919
In this paper, we present a series of methods to authenticate a user with a graphical password. To that end, we employ the user¿s…
Expand
Highly Cited
2006
Highly Cited
2006
Privacy preserving multi-factor authentication with biometrics
Abhilasha Bhargav-Spantzel
,
A. Squicciarini
,
E. Bertino
Digital Identity Management
2006
Corpus ID: 2109154
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication…
Expand
Highly Cited
2005
Highly Cited
2005
Effects of cutting edge geometry, workpiece hardness, feed rate and cutting speed on surface roughness and forces in finish turning of hardened AISI H13 steel
T. Özel
,
T. Hsu
,
E. Zeren
2005
Corpus ID: 18591765
In this study, the effects of cutting edge geometry, workpiece hardness, feed rate and cutting speed on surface roughness and…
Expand
Highly Cited
2002
Highly Cited
2002
Computing Person and Firm Effects Using Linked Longitudinal Employer-Employee Data
J. Abowd
,
R. Creecy
,
F. Kramarz
2002
Corpus ID: 120270866
In this paper we provide the exact formulas for the direct least squares estimation of statistical models that include both…
Expand
Highly Cited
2000
Highly Cited
2000
Cattle Manure Amendments Can Increase the pH of Acid Soils
J. Whalen
,
Chi Chang
,
G. Clayton
,
J. P. Carefoot
2000
Corpus ID: 54762022
Crop production on acid soils can be improved greatly by adjusting the pH to near neutrality. While soil acidity is commonly…
Expand
Highly Cited
2000
Highly Cited
2000
Interaction of Cognitive Avoidance Coping and Stress in Predicting Depression/Anxiety
J. Blalock
,
T. Joiner
Cognitive Therapy and Research
2000
Corpus ID: 45329336
This study investigated (1) the moderating effects of gender and cognitive avoidance coping on the negative life events…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required