Access to Network Login by Three-Factor Authentication for Effective Information Security
Today’s technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping mone...
Saved in:
Main Authors: | S. Vaithyasubramanian, A. Christy, D. Saravanan |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2016-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2016/6105053 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
by: M. Natarajan, et al.
Published: (2025-02-01) -
Secure access authentication scheme for 4G wireless network based on PCL
by: Li-li WANG, et al.
Published: (2012-04-01) -
Security access permission authentication simulation of multi-source network big data based on blockchain
by: Bin LI, et al.
Published: (2024-02-01) -
Pairing-free certificateless blockchain-based access authentication method for spatial information network
by: HUO Ru, et al.
Published: (2024-08-01) -
Secure authentication enhancement scheme for seamless handover and roaming in space information network
by: Kaiping XUE, et al.
Published: (2019-06-01)