Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal

Background: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphasized more and more. The existing method of user au...

Full description

Bibliographic Details
Main Authors: Semin Kim, Hyung-Jin Mun, Sunghyuck Hong
Format: Article
Language:English
Published: MDPI AG 2022-02-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/5/2301