-
1
A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol
Published 2024-11-01Subjects: Get full text
Article -
2
SENTRIN- IMPLEMENTASI ALGORITMA CLEFIA 128DAN TIME-BASED ONE TIME PASSWORDSEBAGAI TWO-FACTOR AUTHENTICATIONUNTUK MENINGKATKAN KEAMANANPADA PROSES AUTENTIKASI
Published 2025-06-01Subjects: “…two factor authentication…”
Get full text
Article -
3
Until you have something to lose! Loss aversion and two-factor authentication adoption
Published 2025-01-01Subjects: “…Two-factor authentication…”
Get full text
Article -
4
Security of School Financial Transaction Applications with the Implementation of Two Factor Authentication Method
Published 2025-05-01Subjects: “…two-factor authentication…”
Get full text
Article -
5
Two-factor authentication for intellectual property transactions based on improved zero-knowledge proof
Published 2025-02-01Subjects: Get full text
Article -
6
Optimized Identity Authentication via Channel State Information for Two-Factor User Verification in Information Systems
Published 2025-04-01Subjects: Get full text
Article -
7
The Assistance of Eye Blink Detection for Two- Factor Authentication
Published 2023-09-01Subjects: Get full text
Article -
8
Bio-2FA-IoD: A Biometric-Enhanced Two-Factor Authentication Protocol for Secure Internet of Drones Operations
Published 2025-07-01Subjects: Get full text
Article