Access to Network Login by Three-Factor Authentication for Effective Information Security
Today’s technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping mone...
Saved in:
Main Authors: | S. Vaithyasubramanian, A. Christy, D. Saravanan |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2016-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2016/6105053 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
by: M. Natarajan, et al.
Published: (2025-02-01) -
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
by: K. Saravanan, et al.
Published: (2025-01-01) -
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
by: Yan Zhao, et al.
Published: (2019-04-01) -
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
by: Keiichi Iwamura, et al.
Published: (2025-01-01) -
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
by: Jun-Sub Kim, et al.
Published: (2013-01-01)