Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multi-factor
biblio
Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint
Submitted by aekwall on Tue, 03/09/2021 - 10:56am
mistrust server
token ID
three-factor authentication scheme
three factor authentication
Source code analysis
Software
Servers
searchable encryption scheme
searchable encryption
Scalability
RSA
Resiliency
pubcrawl
password
pass-code
multi-factor
biometric encryption
Metrics
fingerprint identification
fingerprint
encryption
encrypted content
decryption
Cryptography
cloud server
Cloud Computing
biometrics
biometric fingerprint
authorisation
authentication
3FA
biblio
Symmetric-Key Multi-Factor Biometric Authentication Scheme
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
multi-factor
symmetric-key multifactor biometric authentication scheme
smart-card
Silicon
Servers
security attacks
Resiliency
pubcrawl
ProVerif
ProVeri
private key cryptography
password
multifactor authentication
authentication
Metrics
identity password
Human Factors
Germanium
Cryptography
Cao and Ge's scheme
Burrows-Abadi-Needham (BAN) logic
biometrics (access control)
biometric techniques
biometric
authorisation
biblio
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments
Submitted by grigby1 on Wed, 07/18/2018 - 9:24am
multi-factor
authentication
biometrics
Human behavior
human behaviour
human factor
Human Factors
man-in-the-middle attack
mobile cloud computing
wireless
networks
pubcrawl
security
Sniffing
SSO
Two Factor
two factor authentication
biblio
Robust Multi-Factor Authentication for Fragile Communications
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
Large-scale systems
user authentication
telecommunication services
stand-alone authentication
stand-alone
slow connection situation
Servers
secure generic multifactor authentication protocol
robust multifactor authentication
remote central authentication server
Protocols
privacy
natural disasters
multi-factor
authentication
fragile communications
file servers
emergency situations
efficiency
digital signatures
Cyber Attacks
Communication channels
biometrics (access control)
authorisation
authentication service
authentication process
authentication mechanism