1 |
Is your OTP safe? Here is how hackers are redirecting your SMS. https://www.businesstoday.in/latest/trends/is-your-otp-safe-here-is-how-hackers-are-redirecting- your-sms/story/433994.html. Date accessed: 06-13-2021
|
2 |
Alston, A. (2021). A new era in cybersecurity through biometric technology (Order No. 28494739). Available from ProQuest Dissertations & Theses Global. (2537678931). Retrieved from https://www.proquest.com/dissertations-theses/new-era-cybersecurity-through-biometric/docview/2537678931/se-2?accountid=34495
|
3 |
Mishra, Gouri & Mishra, Pradeep & Nand, Parma & Astya, Rani & ., Amrita. (2020). User Authentication: A Three Level Password Authentication Mechanism. Journal of Physics: Conference Series. 1712. 012005. 10.1088/1742-6596/1712/1/012005.
DOI
|
4 |
Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Nicola Zannone, A survey on multi- factor authentication for online banking in the wild, Computers & Security, Volume 95, 2020, 101745, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101745.
DOI
|
5 |
Tabassum M., Sarower A.H., Esha A., Hassan M.M. (2020) An Enhancement of Kerberos Using Biometric Template and Steganography. In: Bhuiyan T., Rahman M.M., Ali M.A. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 325. Springer, Cham. https://doi.org/10.1007/978-3-030-52856-0_9
DOI
|
6 |
B Poornima, Dr. Savadam Balaji. (2021). Cyber Security for Atm Terminals. Annals of the Romanian Society for Cell Biology, 8785-8789. Retrieved from https://www.annalsofrscb.ro/index.php/journal/article/view/3599
|
7 |
Fatma Hendaoui, Hamdi Eltaief, Habib Youssef, UAP: A unified authentication platform for IoT environment, Computer Networks, Volume 188, 2021, 107811, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2021.107811.
DOI
|
8 |
Das, S. (2020). A risk-reduction-based incentivization model for human-centered multifactor authentication (Doctoral dissertation, Indiana University). https://www.proquest.com/openview/38faf90785cf47c997333c8a799e1e83/1?pq-origsite=gscholar&cbl=18750&diss=y
|
9 |
Ometov A, Bezzateev S, Makitalo N, Andreev S, Mikkonen T, Koucheryavy Y. Multi-Factor Authentication: A Survey. Cryptography. 2018 Jan 5;2(1). https://doi.org/10.3390/cryptography2010001
DOI
|
10 |
Supeshala, Chamidu. (2017). Speaker Recognition using Voice Biometrics. https://www.researchgate.net/publication/344349873_Speaker_Recognition_using_Voice_BiometricsFigures
|
11 |
Stamp, M. (2011). Information security: principles and practice. John Wiley & Sons. ISBN: 978-1-118-02796-7, https://www.wiley.com/ens/Information+Security%3A+Principles+and+Practice%2C+2nd+Edition-p-9781118027967
|
12 |
Patel C., Doshi N. (2019) Security Challenges in IoT Cyber World. In: Hassanien A., Elhoseny M., Ahmed S., Singh A. (eds) Security in Smart Cities: Models, Applications, and Challenges. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-01560-2_8
DOI
|