Survey on usable and secure two-factor authentication
BS Archana, A Chandrashekar… - 2017 2nd IEEE …, 2017 - ieeexplore.ieee.org
System resources are usually not retrieved through deception by users who are not legal.
This is basically ensured by Authentication. Text password is one of the forms of user …
This is basically ensured by Authentication. Text password is one of the forms of user …
Faceture ID: face and hand gesture multi-factor authentication using deep learning
ERM Aleluya, CT Vicente - Procedia Computer Science, 2018 - Elsevier
Access control is the act of providing privacy to a resource, and authentication through a
single factor is no longer reliable to provide robust protection against unauthorized access …
single factor is no longer reliable to provide robust protection against unauthorized access …
Exploring the perceptions of accountants on academic preparations related to occupational fraud and internal control weaknesses
MM Sahloul - 2019 - digitalcommons.liberty.edu
Occupational fraud and internal control material weaknesses (ICMWs) have become global
issues due to the strong correlation between internal control (IC) and fraud revelation …
issues due to the strong correlation between internal control (IC) and fraud revelation …
Building an authentication infrastructure—designing a two factor authentication hardware token with form factor that encourages engagement
The death of the password has been projected for decades, by a range of highly qualified
experts. Yet passwords remain the dominant authentication technology. The dominance of …
experts. Yet passwords remain the dominant authentication technology. The dominance of …
Dual factor authentication to procure cloud services
Cloud is a forthcoming revolution in organizations because of maintaining different services
like SaaS, PaaS, DaaS, laaS for public and private users of information technology. To avail …
like SaaS, PaaS, DaaS, laaS for public and private users of information technology. To avail …
Identity fraud: A literature review and future research directions
Identity fraud has been reported as one of the fastest growing crimes in the world today, and
a key facilitator of terrorism, money laundering and trafficking (of people, drugs, weapons …
a key facilitator of terrorism, money laundering and trafficking (of people, drugs, weapons …
[PDF][PDF] The Prevalence of and Factors Contributing to Complicated Malaria in Children Under 5 years at Kampala International University Teaching Hospital
D Marera - 2015 - ir.kabarak.ac.ke
Objectives➢ To assess the prevalence of complicated malaria in children under five years
attending KIUTH.➢ To determine the most common complication of malaria in children under …
attending KIUTH.➢ To determine the most common complication of malaria in children under …