共 50 条
- [2] On the Security of Multi-Factor Authentication: Several Instructive Examples [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 685 - 687
- [3] CLOUD STORAGE SECURITY USING MULTI-FACTOR AUTHENTICATION [J]. 2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
- [4] Smart Home Security: An Efficient Multi-Factor Authentication Protocol [J]. IEEE ACCESS, 2024, 12 : 106253 - 106272
- [5] A Survey on the Security in Cyber Physical System with Multi-Factor Authentication [J]. 2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 1322 - +
- [7] Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (03): : 1633 - 1647
- [8] A Survey on the Security in Cyber Physical System with Multi-Factor Authentication [J]. 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 1322 - +
- [9] Pick Location Security: Seamless Integrated Multi-Factor Authentication [J]. 2017 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2017,
- [10] Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 201 - 211