Review of Security Analysis and Performance Evaluation of an Enhanced Two-Factor Authenticated Scheme

Download Now
Provided by: International Journal of Electrical, Electronics and Computer Engineering (IJEECE)
Topic: Security
Format: PDF
Authentication is any protocol or process that permits one entity to establish the identity of another entity. It relies on three factors: something a user knows, such as a password or PIN, something a user has, such as a key, a card, or another kind of token and something a user is, such as a retina scan, or fingerprint. The authors can increase the reliability and security of the authentication mechanism by combining multiple authentication factors into a single model. The two factors together provide a much higher confidence in the authentication. This paper reviews various two-factor authentication schemes.
Download Now

Find By Topic