咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 99 篇 期刊文献
  • 4 篇 学位论文
  • 1 篇 科技报告

馆藏范围

  • 354 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 199 篇 工学
    • 163 篇 计算机科学与技术...
    • 77 篇 电气工程
    • 61 篇 信息与通信工程
    • 22 篇 软件工程
    • 12 篇 仪器科学与技术
    • 12 篇 控制科学与工程
    • 9 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 4 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 石油与天然气工程
    • 3 篇 安全科学与工程
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
  • 26 篇 理学
    • 14 篇 化学
    • 12 篇 生物学
    • 9 篇 数学
    • 3 篇 物理学
    • 1 篇 地理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 16 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 3 篇 公共管理
    • 2 篇 工商管理
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 政治学
  • 3 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 354 篇 multi-factor aut...
  • 87 篇 security
  • 48 篇 authentication
  • 39 篇 passwords
  • 30 篇 protocols
  • 28 篇 encryption
  • 27 篇 biometrics
  • 27 篇 cloud computing
  • 20 篇 protection
  • 19 篇 internet of thin...
  • 17 篇 privacy
  • 16 篇 servers
  • 15 篇 reliability
  • 15 篇 password
  • 15 篇 organizations
  • 14 篇 user experience
  • 14 篇 blockchains
  • 14 篇 usability
  • 13 篇 real-time system...
  • 12 篇 access control

机构

  • 3 篇 fdn bruno kessle...
  • 2 篇 chongqing three ...
  • 2 篇 ibn tofail univ ...
  • 2 篇 hassan ii univ c...
  • 2 篇 centre of resear...
  • 2 篇 nankai univ coll...
  • 2 篇 faculty of infor...
  • 2 篇 ubl irisa imt at...
  • 2 篇 univ denver denv...
  • 2 篇 maharishi school...
  • 2 篇 natl taiwan univ...
  • 2 篇 univ bucharest f...
  • 2 篇 state grid tianj...
  • 2 篇 univ chinese aca...
  • 2 篇 ewha womans univ...
  • 2 篇 state grid infor...
  • 2 篇 brno university ...
  • 2 篇 state grid smart...
  • 2 篇 natl elect & com...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 bouabdallah ahme...
  • 3 篇 carbone roberto
  • 3 篇 sadik mohamed
  • 3 篇 sabir essaid
  • 3 篇 doss robin
  • 3 篇 wang ding
  • 3 篇 mansour abdeljeb...
  • 3 篇 kambou samy
  • 2 篇 yongsheng zhao
  • 2 篇 sinigaglia feder...
  • 2 篇 jianying zhou
  • 2 篇 wang ping
  • 2 篇 lee hakjun
  • 2 篇 le guelvouit gae...
  • 2 篇 kebande victor r...
  • 2 篇 kim aeyoung
  • 2 篇 das sanchari
  • 2 篇 kumar tarun
  • 2 篇 sanchari das
  • 2 篇 jassim sabah

语言

  • 347 篇 英文
  • 4 篇 中文
  • 3 篇 其他
  • 1 篇 德文
检索条件"主题词=Multi-factor authentication"
354 条 记 录,以下是1-10 订阅
排序:
SMFA: Strengthening multi-factor authentication With Steganography for Enhanced Security
收藏 引用
IEEE ACCESS 2025年 13卷 43593-43606页
作者: Sarower, Afjal H. Bhuiyan, Touhid Hassan, Maruf Arefin, Mohammad Shamsul Hossain, Gahangir Daffodil Int Univ Dept Comp Sci & Engn Dhaka 1216 Bangladesh Washington Univ Sci & Technol Sch Informat Technol Alexandria VA 22314 USA Southeast Univ Dept Comp Sci & Engn Dhaka 1208 Bangladesh Dept Comp Sci & Engn Chittagong 4349 Bangladesh Univ North Texas Dept Informat Sci Denton TX 76205 USA
Traditional password-based authentication mechanisms exhibit significant security vulnerabilities, prompting the adoption of multi-factor authentication (MFA) to enhance user verification. However, current MFA methods... 详细信息
来源: 评论
An Identity Management Scheme Based on multi-factor authentication and Dynamic Trust Evaluation for Telemedicine
收藏 引用
SENSORS 2025年 第7期25卷 2118-2118页
作者: Wu, Yishan Pang, Mengxue Ma, Jianqiang Ou, Wei Yue, Qiuling Han, Wenbao Hainan Univ Sch Cyberspace Secur Sch Cryptol Haikou 570228 Peoples R China Lab Adv Comp & Intelligence Engn Wuxi 214100 Peoples R China Jiangsu Variable Supercomp Technol Co Ltd Wuxi 214100 Peoples R China
Telemedicine diagnosis has become a more flexible and convenient way to receive diagnoses, which is of great significance in enhancing diagnosis, cutting costs, and serving remote users. However, telemedicine faces ma... 详细信息
来源: 评论
Enhancing Cloud Security: A multi-factor authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY
收藏 引用
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY 2025年 第1期6卷 392-402页
作者: Sasikumar, K. Nagarajan, Sivakumar Vellore Inst Technol Sch Comp Sci & Engn Vellore 632014 India
The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. authentication is crucial for safeguarding these data. Despite various p... 详细信息
来源: 评论
multi-factor authentication for Web Applications Using JWT and Face Embedding-Based Recognition
Multi-Factor Authentication for Web Applications Using JWT a...
收藏 引用
Cybernetics and Innovations (ICCI), International Conference on
作者: Chaiyanan Sompong Apiwat Kaiburt Phakwan Penjamuk Anuwat Supan Thanadon Boonphiohat Phattharaphon Kunmee Department of Computer Science Sakon-Nakhon Rajabhat University Sakon-Nakhon Thailand
Stateless authentication using JSON Web Tokens (JWT) has become widely adopted in web applications over the past decade. Typically, this method relies on a single authentication factor, namely a username and password,... 详细信息
来源: 评论
multi-factor authentication for Secured Financial Transactions Through Spatio-TGCN Model
Multi-Factor Authentication for Secured Financial Transactio...
收藏 引用
Visual Analytics and Data Visualization (ICVADV), International Conference on
作者: Bhagwan Jagwani Abbasov Habib Hasan Kuldeep Agnihotri Khushbu Jain Anvesh Perada D. Gobinath Department of Management PSIT College of Higher Education Kanpur Uttar Pradesh India Department of Mathematics and ICT Baku Eurasian University Azerbaijan ISBA Group of Institutes Indore Madhya Pradesh India Department of Commerce and Management ISBA Group of Institutes Indore Madhya Pradesh India Department of Electrical and Computer Engineering Drexel University Philadelphia Pennsylvania USA Department of AIML CMR University Bangalore Puducherry India
In the information economy, online financial transactions must be secure. Digital platforms for everyday transactions put financial services customers at danger of fraud and unauthorized access. This research integrat... 详细信息
来源: 评论
Challenge-Response Pair Mechanisms and multi-factor authentication Schemes to Protect Private Keys
收藏 引用
APPLIED SCIENCES-BASEL 2025年 第6期15卷 3089-3089页
作者: Cambou, Bertrand Francis Alam, Mahafujul No Arizona Univ Sch Informat Comp & Cyber Syst Flagstaff AZ 86011 USA
Featured Application Protection of private keys for signing transactions in public key infrastructures for crypto wallets and terminal *** Crypto wallets store and protect the private keys needed to sign transactions ... 详细信息
来源: 评论
Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEM
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2025年 166卷
作者: Braeken, A. Vrije Univ Brussel INDI Pl laan 2 B-1050 Brussels Belgium
Post-quantum computing becomes a real threat in the coming years, resulting in vulnerable security protocols that rely on traditional public key algorithms. It is not evident to provide protection against it in a cost... 详细信息
来源: 评论
Beyond passwords: A multi-factor authentication approach for robust digital security
收藏 引用
INTERNET TECHNOLOGY LETTERS 2025年 第2期8卷
作者: Simha, R. Keerthan Raghavan, H. K. Prabhu, Akshatha Joshi, Pallavi Amrita Vishwa Vidhyapeetham Amrita Sch Comp Dept Comp Sci Mysuru India
multi-factor authentication (MFA) strengthens digital security by necessitating users to verify their identity. It uses various authentication methods like adding an extra layer of protection beyond conventional passw... 详细信息
来源: 评论
Dynamic Trust Management and AI-Based multi-factor authentication for 6G Machine Type Communications
Dynamic Trust Management and AI-Based Multi-Factor Authentic...
收藏 引用
Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), International Conference on
作者: Garima Sinha Ankita Agarwal Department of Computer Science Engineering Faculty of Engineering and Technology JAIN (Deemed-to-be University) Ramnagar District Karnataka India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
New security concerns about the transmission of sensitive data over enormous networks of linked devices have arisen with the advent of the 6G era and the broad adoption of massive machine-type communication (MTC). The... 详细信息
来源: 评论
Developing multi-factor authentication and Biometric Verification Protocols for Enhancing Data Security in IoT Healthcare Devices
Developing Multi-Factor Authentication and Biometric Verific...
收藏 引用
International Conference on Computer and Automation Engineering, ICCAE
作者: Hamdan Alshehri Department of Computer Science Jazan University Jazan Saudi Arabia
This paper introduces a multi-factor authentication System for enhancing data security in IoT healthcare devices. The system comprises the multi-factor authentication Algorithm (MFAA), Biometric Template Protection Al... 详细信息
来源: 评论