Jonsson et al., 2022 - Google Patents
Multi-factor authentication mechanism based on browser fingerprinting and graphical honeytokensJonsson et al., 2022
View PDF- Document ID
- 15615236145679610385
- Author
- Jonsson D
- Marteni A
- Publication year
External Links
Snippet
Multi-factor authentication (MFA) offers a wide range of methods and techniques available today. The security benefits of using MFA are almost indisputable, however, users are reluctant to adopt the technology. While many new MFA solutions are being proposed, there …
- 238000011160 research 0 abstract description 69
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Papathanasaki et al. | Modern authentication methods: A comprehensive survey | |
Almuairfi et al. | A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices | |
Matta et al. | TCpC: a graphical password scheme ensuring authentication for IoT resources | |
Raponi et al. | A longitudinal study on web-sites password management (in) security: evidence and remedies | |
Nizamani et al. | A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability | |
Yusop et al. | Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity | |
Deshpande et al. | An evaluation of authentication technologies for web-based wireless network security | |
Catuogno et al. | Analysis of a two-factor graphical password scheme | |
Notoatmodjo | Exploring the'weakest link': A study of personal password security | |
Zhao et al. | Explicit authentication response considered harmful | |
Dib et al. | Insider attack model against HSM-based architecture | |
Gupta et al. | Passblot: A highly scalable graphical one time password system | |
Manjula et al. | Pre-authorization and post-authorization techniques for detecting and preventing the session hijacking | |
Syahreen et al. | A Systematic Review on Multi-Factor Authentication Framework. | |
Jonsson et al. | Multi-factor authentication mechanism based on browser fingerprinting and graphical honeytokens | |
Shiaeles | Grablok: A novel graphical password authentication utilising blockchain technology | |
Thapa et al. | Security analysis of user authentication and methods | |
Luckett | A Zero Trust Roadmap for Consumers and Small Businesses | |
Raponi et al. | A spark is enough in a straw world: A study of websites password management in the wild | |
Migdal | Contributions to keystroke dynamics for privacy and security on the Internet | |
Leitner et al. | Authentication in the context of E-participation: current practice, challenges and recommendations | |
Andress | Foundations of Information Security | |
Mehtälä | The Cybercriminal Arsenal: MFA Attacks | |
Majdalawieh et al. | Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking | |
Khadilkar | Securing Internet Banking Against Data Phishing Using Cryptography |