2023
DOI: 10.1016/j.jisa.2023.103477
|View full text |Cite
|
Sign up to set email alerts
|

Secure multi-factor access control mechanism for pairing blockchains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Authentication traditionally relies on three elements: something you know (knowledge elements), something you own (ownership factors), and something you are (inheritance elements) [7,8]. Knowledge factors, also known as knowledge-based authentication, involve elements such as passwords, personal identification numbers (PINs), challenge-response mechanisms, or security questions [6][7][8][9][10]. Ownership factors, known as token-based authentication, rely on possessions such as ID cards, ATM cards, cryptographic keys, security tokens, and more [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Authentication traditionally relies on three elements: something you know (knowledge elements), something you own (ownership factors), and something you are (inheritance elements) [7,8]. Knowledge factors, also known as knowledge-based authentication, involve elements such as passwords, personal identification numbers (PINs), challenge-response mechanisms, or security questions [6][7][8][9][10]. Ownership factors, known as token-based authentication, rely on possessions such as ID cards, ATM cards, cryptographic keys, security tokens, and more [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…Knowledge factors, also known as knowledge-based authentication, involve elements such as passwords, personal identification numbers (PINs), challenge-response mechanisms, or security questions [6][7][8][9][10]. Ownership factors, known as token-based authentication, rely on possessions such as ID cards, ATM cards, cryptographic keys, security tokens, and more [6][7][8][9][10]. Inherence factors, or biometric-based authentication, leverage unique user characteristics or behaviors, including fingerprints, retinal patterns, DNA sequences, signatures, faces, voices, bio-electrical signals, and others [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations