Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "2FA" wg kryterium: Temat


Wyświetlanie 1-10 z 10
Tytuł:
Two-factor authentication (2FA) comparison of methods and applications
Autorzy:
Florczak, Sebastian
Jasiak, Adrian
Szczygieł, Izabela
Powiązania:
https://bibliotekanauki.pl/articles/31233162.pdf
Data publikacji:
2023
Wydawca:
Patryk Organiściak
Tematy:
cybersecurity
authentication
two-factor authentication
2FA
bezpieczeństwo cybernetyczne
uwierzytelnianie
uwierzytelnianie dwuskładnikowe
Opis:
In this document, the investigation delves into the realm of two-factor authentication (2FA), exploring its applications and comparing various methods of implementation. Two-factor authentication, often referred to colloquially as two-step verification, serves to enhance credential security during login processes across platforms such as Facebook and online banking, among others. While 2FA has significantly improved the security of the login and registration processes, it is noteworthy that its adoption tends to be more prevalent among younger individuals. Unfortunately, an increasing number of financial scams target older individuals who may be disinclined to engage with what they perceive as the complexity of multi-step authentication and password confirmation. Subsequent chapters provide a discussion of the various types of two-factor authentication, furnish detailed descriptions, and offer a summary of the benefits and gains achievable through the deployment of 2FA.
Źródło:
Advances in Web Development Journal; 2023, 1; 26-45
2956-8463
Pojawia się w:
Advances in Web Development Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of potential risks of SMS-based authentication
Autorzy:
Szpunar, Albert
Stęchły, Arkadiusz
Powiązania:
https://bibliotekanauki.pl/articles/31233158.pdf
Data publikacji:
2023
Wydawca:
Patryk Organiściak
Tematy:
authentication
cyber security
two-factor authentication
2FA
SMS
text message
uwierzytelnianie
bezpieczeństwo cybernetyczne
uwierzytelnianie dwuskładnikowe
wiadomość tekstowa
Opis:
The pervasive use of mobile devices and the omnipresence of the Internet have ushered in a transformative era. Nearly everyone, regardless of age, possesses a mobile phone, bridging generational gaps in digital interaction. Mobile phones have become highly personal, with users guarding them zealously. Service providers recognize this intimate relationship, offering an opportunity to enhance security. Traditional password-based security is vulnerable to data breaches, prompting the adoption of mobile phones as a more robust platform for safeguarding digital assets. This shift has also facilitated the development of digital identification applications, reducing reliance on physical identity documents. Additionally, mobile banking applications are replacing physical payment cards, enabling secure transactions. The ascendancy of mobile payment solutions is diminishing the role of physical cash and wallets. In summary, mobile devices have reshaped security and daily activities, becoming the cornerstone of our digital existence, offering higher levels of security, convenience, and efficiency.
Źródło:
Advances in Web Development Journal; 2023, 1; 13-25
2956-8463
Pojawia się w:
Advances in Web Development Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protecting web applications from authentication attacks
Autorzy:
Gugała, Łukasz
Łaba, Kamil
Dul, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/31233161.pdf
Data publikacji:
2023
Wydawca:
Patryk Organiściak
Tematy:
web application security
cybersecurity
2FA
authentication
two-factor authentication
bezpieczeństwo aplikacji internetowych
bezpieczeństwo cybernetyczne
uwierzytelnianie
uwierzytelnianie dwuskładnikowe
Opis:
This paper explores the critical domain of safeguarding web-based applications against authentication attacks, recognizing the persistent challenges posed by evolving cyber threats. The project delineates the distinct objectives of such attacks, including data theft, identity theft, and service disruption, underlining their potential far-reaching implications, such as the compromise of sensitive corporate data and the execution of unauthorized administrative operations. It underscores the pivotal role of user awareness and education as the ultimate defense against authentication-related breaches. Robust security measures, encompassing the use of strong, intricate passwords, encrypted network communication, two-factor authentication, and the regulation of failed login attempts, are emphasized as essential safeguards. Additionally, the project underscores the significance of maintaining system components through regular updates and conducting comprehensive security audits. A holistic approach, integrating technical and human factors, underscores user awareness and ongoing training as indispensable elements in the endeavor to enhance security in an increasingly digital landscape. "Protecting Web Applications from Authentication Attacks" aims to equip its readers with a comprehensive understanding of authentication system security and offers practical directives for bolstering defense mechanisms in a professional and formal context.
Źródło:
Advances in Web Development Journal; 2023, 1; 26-42
2956-8463
Pojawia się w:
Advances in Web Development Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ZrO2 Gelcast Foams Coated with Apatite Layers
Autorzy:
Potoczek, M.
Kocyło, E.
Krauz, M.
Tłuczek, A.
Powiązania:
https://bibliotekanauki.pl/articles/351260.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
gel-casting of foams
porous ZrO2
fluorapatite
FA
hydroxyapatite
HA
coating
Opis:
In this work, gel-casting of foams method was used to produce ZrO2 porous ceramics. The obtained foams with total porosity of 89.5 vol% were composed of approximately spherical cells having the mean diameter of 537 ± 153 μm interconnected by circular cell windows having the mean diameter of 152 ± 82 μm. Next, the ZrO2 foams were coated with fluorapatite (FA) and hydroxyapatite (HA) layers by slurry infiltration. The intermediate fluorapatite (FA) layer was introduced to prevent the chemical reactions between ZrO2 and HA at high temperatures during sintering process. The ZrO2 samples containing only HA coatings, were also tested, for comparison. The obtained ceramic biomaterials were subjected to in vitro tests in the simulated body fluid (SBF) solution. The results show that the ZrO2 foams with FA/HA layers possessed better bioactivity than the foams with the HA/HA coating.
Źródło:
Archives of Metallurgy and Materials; 2020, 65, 2; 885-891
1733-3490
Pojawia się w:
Archives of Metallurgy and Materials
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
O cukrzycy u myszy i ludzi, czyli o modelach zwierzecych w doswiadczeniach
Autorzy:
Ciesla, M
Powiązania:
https://bibliotekanauki.pl/articles/846264.pdf
Data publikacji:
2010
Wydawca:
Polskie Towarzystwo Przyrodników im. Kopernika
Tematy:
choroby czlowieka
cukrzyca typu 1
cukrzyca typu 2
objawy chorobowe
czynniki chorobotworcze
czynniki genetyczne
rozwoj choroby
modele zwierzece
szczury BB
myszy NOD
myszy ob-ob
myszy db-db
myszy Wellesley
szczury Goto-Kakizaki
szczury fa-fa
Źródło:
Wszechświat; 2010, 111, 07-09; 178-182
0043-9592
Pojawia się w:
Wszechświat
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Synthesis of Reconfigurable Multiple Shaped Beams of a Concentric Circular Ring Array Antenna Using Evolutionary Algorithms
Autorzy:
Dubey, Sanjay Kumar
Mandal, Debasis
Powiązania:
https://bibliotekanauki.pl/articles/2200965.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cosec2 beam
differential evolution algorithm (DE)
firefly algorithm (FA)
flat top beam
genetic algorithm (GA)
multiple shaped beam patterns
pencil beam
Opis:
The approach described in this paper uses evolutionary algorithms to create multiple-beam patterns for a concentric circular ring array (CCRA) of isotropic antennas using a common set of array excitation amplitudes. The flat top, cosec2, and pencil beam patterns are examples of multiple-beam patterns. All of these designs have an upward angle of θ = 0◦. All the patterns are further created in three azimuth planes (φ = 0◦, 5◦, and 10◦). To create the necessary patterns, non-uniform excitations are used in combination with evenly spaced isotropic components. For the flat top and cosecant-squared patterns, the best combination of common components, amplitude and various phases is applied, whereas the pencil beam pattern is produced using the common amplitude only. Differential evolutionary algorithm (DE), genetic algorithm (GA), and firefly algorithm (FA) are used to generate the best 4-bit discrete magnitudes and 5-bit discrete phases. These discrete excitations aid in lowering the feed network design complexity and the dynamic range ratio (DRR). A variety of randomly selected azimuth planes are used to verify the excitations as well. With small modifications in the desired parameters, the patterns are formed using the same excitation. The results proved both the efficacy of the suggested strategy and the dominance of DE over GA as well as FA.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 1; 8--17
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-10 z 10

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies