[go: up one dir, main page]

Jonsson et al., 2022 - Google Patents

Multi-factor authentication mechanism based on browser fingerprinting and graphical honeytokens

Jonsson et al., 2022

View PDF
Document ID
15615236145679610385
Author
Jonsson D
Marteni A
Publication year

External Links

Snippet

Multi-factor authentication (MFA) offers a wide range of methods and techniques available today. The security benefits of using MFA are almost indisputable, however, users are reluctant to adopt the technology. While many new MFA solutions are being proposed, there …
Continue reading at www.diva-portal.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers

Similar Documents

Publication Publication Date Title
Papathanasaki et al. Modern authentication methods: A comprehensive survey
Almuairfi et al. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices
Matta et al. TCpC: a graphical password scheme ensuring authentication for IoT resources
Raponi et al. A longitudinal study on web-sites password management (in) security: evidence and remedies
Nizamani et al. A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability
Yusop et al. Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity
Deshpande et al. An evaluation of authentication technologies for web-based wireless network security
Catuogno et al. Analysis of a two-factor graphical password scheme
Notoatmodjo Exploring the'weakest link': A study of personal password security
Zhao et al. Explicit authentication response considered harmful
Dib et al. Insider attack model against HSM-based architecture
Gupta et al. Passblot: A highly scalable graphical one time password system
Manjula et al. Pre-authorization and post-authorization techniques for detecting and preventing the session hijacking
Syahreen et al. A Systematic Review on Multi-Factor Authentication Framework.
Jonsson et al. Multi-factor authentication mechanism based on browser fingerprinting and graphical honeytokens
Shiaeles Grablok: A novel graphical password authentication utilising blockchain technology
Thapa et al. Security analysis of user authentication and methods
Luckett A Zero Trust Roadmap for Consumers and Small Businesses
Raponi et al. A spark is enough in a straw world: A study of websites password management in the wild
Migdal Contributions to keystroke dynamics for privacy and security on the Internet
Leitner et al. Authentication in the context of E-participation: current practice, challenges and recommendations
Andress Foundations of Information Security
Mehtälä The Cybercriminal Arsenal: MFA Attacks
Majdalawieh et al. Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking
Khadilkar Securing Internet Banking Against Data Phishing Using Cryptography