2020
DOI: 10.5593/sgem2020/2.1/s07.052
|View full text |Cite
|
Sign up to set email alerts
|

Using the Universal Two Factor Authentication Method in Web Applications by Software Emulated Device

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…Newly created or relocated virtual machines will change the infrastructure and the original planning for a certain number of virtual machines and the resource load caused by these machines will no longer be valid. Security problems should also be considered [11] [13].…”
Section: Stress Condition In Capacity Planning Processmentioning
confidence: 99%
“…Newly created or relocated virtual machines will change the infrastructure and the original planning for a certain number of virtual machines and the resource load caused by these machines will no longer be valid. Security problems should also be considered [11] [13].…”
Section: Stress Condition In Capacity Planning Processmentioning
confidence: 99%
“…EDI is a well-known and widely adapted technology for electronic data interchange (e.g., in [27], [28] and [29]). The adaption of using structured messages (EDIFACT invoices) needs changes in ERP systems (e.g., in [30], [31], [32]). The ERP systems must be upgraded to newer versions, which allow the export and import of EDIFACT invoices.…”
Section: Software Aspects Of Accountingmentioning
confidence: 99%
“…It ensures that the information sent remains unchanged and sends it only to the intended server, encrypting it with an asymmetric algorithm and a public key. It is supported by almost all modern browsers, client-server applications, and a wide range of communication devices [15]. In case of VPNs the possible use and impact of other well-established protocols such as IPSec which can provide strong authentication should be considered.…”
Section: System Administration Strategy For Securitymentioning
confidence: 99%