T2FA: Transparent Two-Factor Authentication
Traditional username and password-based single-factor authentication is easy to deploy but vulnerable to dictionary attacks, snooping, and brute force attacks. Two-factor authentication (2FA) has been proposed to improve the security, where smart devices are used as the second authentication factor....
Main Authors: | Jiliang Zhang, Xiao Tan, Xiangqi Wang, Aibin Yan, Zheng Qin |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8386653/ |
Similar Items
-
Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks
by: Kaijun Liu, et al.
Published: (2023-11-01) -
Robust and Efficient Authentication and Group–Proof Scheme Using Physical Unclonable Functions for Wearable Computing
by: Sungjin Yu, et al.
Published: (2023-06-01) -
Cryptanalysis of Strong Physically Unclonable Functions
by: Liliya Kraleva, et al.
Published: (2023-01-01) -
Reconfigurable Security Architecture (RESA) Based on PUF for FPGA-Based IoT Devices
by: Armin Babaei, et al.
Published: (2022-07-01) -
Analysis of Physical Unclonable Functions Based on Memory
by: Semen Valerievich Sukhanov
Published: (2015-03-01)