Multi-factor authentication

Known as: 2 step verification, Two factor, Soft token 
Multi-factor authentication (MFA) is a method of computer access control in which a user is only granted access after successfully presenting several… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2015
2015
Due to the recent security infringement incidents of single factor authentication services, there is an inclination towards the… (More)
  • figure 1
  • figure 2
  • table II
  • figure 3
  • table I
Is this relevant?
2014
2014
In large-scale systems, user authentication usually needs the assistance from a remote central authentication server via networks… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
2011
2011
Passwords are one of the most important and yet one of the least secure security protections we use. Hackers can crack a 6… (More)
Is this relevant?
2009
2009
This paper describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
This paper describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In this paper, we present a series of methods to authenticate a user with a graphical password. To that end, we employ the user¿s… (More)
  • table 1
  • figure 1
  • figure 4
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Human authentication is the security task whose job is to limit access to physical locations or computer network only to those… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
A new simple password exponential key exchange method (SPEKE) is described. It belongs to an exclusive class of methods which… (More)
  • table 4
  • figure 4.3
  • table 4.6
Is this relevant?