Cognitive Based Authentication Protocol for Distributed Data and Web Technologies
The objective of the verification process, besides guaranteeing security, is also to be effective and robust. This means that the login should take as little time as possible, and each time allow for a successful authentication of the authorised account. In recent years, however, online users have b...
Saved in:
Main Authors: | Natalia Krzyworzeka, Lidia Ogiela, Marek R. Ogiela |
---|---|
Format: | article |
Language: | EN |
Published: |
MDPI AG
2021
|
Subjects: | |
Online Access: | https://doaj.org/article/5adc7bbc18864ed3a155f4e08a7efbe8 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A CAN-Bus Lightweight Authentication Scheme
by: Jia-Ning Luo, et al.
Published: (2021) -
Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach
by: Abel Z. Agghey, et al.
Published: (2021) -
Implementation of Five Calls Reminder (FCR) as the Adaptive Muroja’ah (Memorization) Method for the Qur’an at Daarunnajah Magelang Islamic Boarding School
by: Laila Sangadah, et al.
Published: (2020) -
A High-Density EEG Study Investigating VR Film Editing and Cognitive Event Segmentation Theory
by: Feng Tian, et al.
Published: (2021) -
Visual cognition
Published: (1994)