T2FA: Transparent Two-Factor Authentication

Traditional username and password-based single-factor authentication is easy to deploy but vulnerable to dictionary attacks, snooping, and brute force attacks. Two-factor authentication (2FA) has been proposed to improve the security, where smart devices are used as the second authentication factor....

Full description

Bibliographic Details
Main Authors: Jiliang Zhang, Xiao Tan, Xiangqi Wang, Aibin Yan, Zheng Qin
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8386653/