Conferences related to Multi-factor Authentication

Back to Top

GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


2019 14th Annual Conference System of Systems Engineering (SoSE)

IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the 14th International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is “Internet of Things as System of Systems”. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2018 13th Annual Conference on System of Systems Engineering (SoSE)

    SoSE is the main conference on Systems of Systems, defined as complex systems created by the systematic and dynamic assembly of various interacting sub-systems. The 2018 conference theme is “Systems of systems Management and Control: Frontiers between cyber, physical, and social systems”.

  • 2017 12th System of Systems Engineering Conference (SoSE)

    Internet of Things as System of Systems

  • 2016 11th System of Systems Engineering Conference (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the Eleventhth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, maritime, energy, environment, healthcare, and transportation. The conference theme is "SoSE and Cyber Physical Systems (CPS), from academia to application and back" We welcome papers on theories, methodologies, and applications of SoSE and CPS in science, technology, industry, and education. Particularly those that deal with the interaction between research institutes, industry, funding and policy makers. What can we do to stimulate both knowledge creation and economic value? Papers should be five to six pages in length, in standard two-column IEEE Conference Proceedings format.

  • 2015 10th System of Systems Engineering Conference (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the Sixth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is “SoSE Controls, Modeling, and Simulation” three areas of significant investment within the public and private sectors as well as being significant initiatives areas of IEEE. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2014 9th International Conference on System of Systems Engineering (SOSE)

    Sociotechnical Aspects of SoSE; The Nexus between Complex Systems Concepts and SoSE; SoSE Application Domains and Case Studies; Open Cloud Computing; SoSE Approaches, Tools, Methods and Processes; SoSE modelling, simulation & and analysis; Entrepreneurship.

  • 2013 8th International Conference on System of Systems Engineering (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the 8th International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is

  • 2012 7th International Conference on System of Systems Engineering (SoSE)

    The conference theme is SoSE in cooperative and competitive distributed decision making in complex dynamic systems , focusing on SoSE control and simulation methodologies to support decisions in different application fields, among others transport, energy, industrial and environmental risk management. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2011 6th International Conference on System of Systems Engineering (SoSE)

    the Sixth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is SoSE in Cloud Computing, Smart Grid, and Cyber Security, three areas of significant investment within the public and private sectors as well

  • 2010 5th International Conference on System of Systems Engineering (SoSE)

    The 5th International Conference on System of Systems Engineering (SoSE) covers engineering fields such as control, computing, communication, information technology and the applications to manufacturing, defense, national and homeland security, aerospace, aeronautics, energy, environment, transport.

  • 2009 IEEE International Conference on System of Systems Engineering (SoSE)

    SYSTEM OF SYSTEMS, ARCHITECHTURE, MODLEING, SIMULATION, EMERGENCE, ENGINEERING, CONTROL, APPLICATION IN DEFENSE, ENERGY, SECURITY, SPACE, AERONAUTICS, MANUFACTURING, EARTH OBSERVATION, WATER RESOURCES, ETC.

  • 2008 IEEE International Conference on System of Systems Engineering (SoSE)

    Various concepts and fundamental theories and applications of system of systems and SoS Engineering will be discussed in this meeting. This is the 3rd of its sereis.

  • 2007 IEEE International Conference on System of Systems Engineering (SoSE)

  • 2006 IEEE/SMC International Conference on System of Systems Engineering (SoSE)


2019 IEEE World Congress on Services (SERVICES)

The scope of the Congress will cover all aspects of innovative services computing and applications, current and emerging. It involves various systems and networking aspects, such as cloud, edge, and Internet-of-Things (IoT), as well as other research and technologies, such as intelligent computing, learning techniques, blockchain and big data, including quality factors, such as high performance, security, privacy, dependability, trustworthiness, and cost-effectiveness.

  • 2018 IEEE World Congress on Services (SERVICES)

    Sponsored the IEEE Computer Society's Technical Committee on Services Computing (TC-SVC) , the 2018 13th World Congress on Services (SERVICES 2017) puts its focus on the industry-specific services and emerging service-oriented technologies. SERVICES 2018 will be co-located with the following five theme topic conferences to explore the deep knowledge space of Services Computing in different directions:

  • 2017 IEEE World Congress on Services (SERVICES)

    all the following services sectors to help define and shape the modernization strategy and directions of the services industry.

  • 2016 IEEE World Congress on Services (SERVICES)

    The 2016 12th World Congress on Services (SERVICES 2016) puts its focus on the industry-specific services and emerging service-oriented technologies. SERVICES 2016 tries to attract researchers, practitioners, and industry business leaders in all the following services sectors to help define and shape the modernization strategy and directions of the services industry. You are invited to submit research, engineering, and business innovation papers to the following business services sectors

  • 2015 IEEE World Congress on Services (SERVICES)

    SERVICES 2015 aims to serve as a federation to host the following five theme topic conferences to explore the deep knowledge space of Services Computing in different directions.

  • 2014 IEEE World Congress on Services (SERVICES)

    2014 IEEE World Congress on Services (SERVICES 2014) aims to serve as a federation to host the following five theme topic conferences to explore the deep knowledge space of Services Computing in different directions:

  • 2013 IEEE World Congress on Services (SERVICES)

    SERVICES 2013 aims to serve as a federation explore the deep knowledge space of Services Computing in different directions.

  • 2012 IEEE World Congress on Services (SERVICES)

    2012 IEEE World Congress on Services (SERVICES 2012) aims to serve as a federation to host the following five theme topic conferences to explore the deep knowledge space of Services Computing in different directions.

  • 2011 IEEE World Congress on Services (SERVICES)

    The theme of the 7th IEEE 2011 World Congress on Services (SERVICES 2011) is "modernization of the services industry." SERVICES 2011 supports and further explores the science and technology of modernizing services industries using latest methods and technologies such as as Services Computing.

  • 2010 IEEE Congress on Services (SERVICES)

    SERVICES 2010 supports and further explores the science and technology of modernizing services industries using latest methods and technologies such as as Services Computing, which has been formally promoted by IEEE Computer Society since 2003.

  • 2009 IEEE Congress on Services (SERVICES)

    The theme of the 2009 IEEE Congress on Services (SERVICES 2009) is "modernization of the services industry". SERVICES 2009 supports and further explores the science and technology of modernizing services industries using latest methods and technologies such as Services Computing, which has been formally promoted by IEEE Computer Society since 2003. From a technology perspective, Services Computing has become the foundational discipline for modernizing the services industry.

  • 2008 IEEE Congress on Services Part I(SERVICES-1)

  • 2007 IEEE Congress on Services (SERVICES)


2019 International Carnahan Conference on Security Technology (ICCST)

ICCST is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on society. The ICCST provides a foundation for support to authorities and agencies responsible for security, safety and law enforcement in the use of available and future technology.


2018 11th IFIP Wireless and Mobile Networking Conference (WMNC)

WMNC 2018 provides a forum for discussion for researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and mobile computing. WMNC combines PWC (Personal Wireless Communications conference), MWCN (Mobile and Wireless Communication Networks conference), and WSAN (Wireless Sensors and Actor Networks conference) into one event. It is Technically Sponsored by IFIP.

  • 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)

    WMNC 2017 provides a forum for discussion for researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and mobile computing. WMNC combines PWC (Personal Wireless Communications conference), MWCN (Mobile and Wireless Communication Networks conference), and WSAN (Wireless Sensors and Actor Networks conference) into one event.

  • 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC)

    WMNC 2016 provides a forum for discussion between researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and mobile computing

  • 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)

    WMNC 2015 provides a forum for discussion between researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and mobile computing.

  • 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC)

    New developments in mobile and wireless networks, services, applications and mobile computing.Track 1: Wireless and Mobile Communications and NetworksTrack 2: Wireless Sensor and Actor Networks, Ad hoc and Opportunistic Networks, Vehicular NetworksTrack 3: Applications and Services over Wireless and Mobile Networks

  • 2013 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC)

    WMNC

  • 2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC)

    The 5th Joint IFIP Wireless Mobile Networking Conference (WMNC'2012) combines the 17th PWC (Personal Wireless Communications conference), the 14th MWCN (Mobile and Wireless Communication Networks conference), and the 6th WSAN (Wireless Sensors and Actor Networks conference) into one event.

  • 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC)

    The aim of WMNC 2011 is to bring together researchers and practitioners from the industry and academia and provide them with a platform to report on recent advances and developments in the emerging areas of wireless and mobile networking and computing. WMNC 2011 will consist of three tracks: - Wireless and Mobile Communications and Networks - Wireless Sensor and Actor Networks, Ad hoc Networks - Applications and Services over Wireless and Mobile Networks

  • 2010 Third Joint IFIP Wireless and Mobile Networking Conference (WMNC)

    PWC conference track Management and control: handoff management QoS: QoS support in mobile and wireless networks, Admission control, QoS for voice and video in wireless/mobile networks Security and privacy in mobile and wireless networks, AAA-Authentication, Authorization and Accounting in mobile and wireless networks Internet: Wireless Internet, Transport layer issues in mobile and wireless networks Modeling and performance evaluation of wireless and mobile networks MWCN conference track Architect


More Conferences

Periodicals related to Multi-factor Authentication

Back to Top

Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Latin America Transactions, IEEE (Revista IEEE America Latina)

The IEEE Region 9 is releasing the IEEE Latin America Transactions to enable the publication of non-published and technically excellent papers from Latin American engineers, in Spanish or Portuguese languages. Engineers and researchers from Portugal and Spain (and others countries with the same language) are also very welcome to submit their proposals.


Network, IEEE

IEEE Network was the number one most-cited journal in telecommunications, the number twelve most-cited journal in electrical and electronics engineering, and the number three most-cited journal in Computer Science Hardware and Architecture in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers topics which include: ...


More Periodicals

Most published Xplore authors for Multi-factor Authentication

Back to Top

Xplore Articles related to Multi-factor Authentication

Back to Top

Mobile multi-factor authentication

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017

Security has always been an important topic when it comes to the communication of sensitive data. With hardware advances allowing users the advantage of accessibility used in mobile devices, individuals are now spending more and more time on these devices. Additionally, with the viral popularity of social media applications and single sign-on, users do not always take as many precautions ...


Database multi-factor authentication via pluggable authentication modules

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017

Authentication schemes containing single factors are becoming increasingly inadequate for many applications. This paper describes the use of Pluggable Authentication Modules as a means of creating a multi-factor authentication scheme for a MySQL database. The resulting scheme is one with a significantly higher degree of security.


Multi-factor authentication using threshold cryptography

2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016

Multi-Factor Authentication is used as a foolproof solution to various issues involved in present day critical authentication systems. However, it comes with the overhead of employing multiple authentication programs to complete the process. Moreover, current multi-factor authentication schemes require all intermediate One Time Passwords(OTPs) to be stored for the lifetime of the authentication process. They also involve security risks whenever ...


Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing

2014 5th International Conference on Intelligent Systems, Modelling and Simulation, 2014

Mobile cloud computing is a new computing technology, which provides on-demand resources. Nowadays, this computing paradigm is becoming one the most interesting technology for IT enterprises. The idea of computing and offloading data in cloud computing is utilized to overcome the inherent challenges in mobile computing. This is carried out by utilizing other resource providers besides the mobile device to ...


Multi-factor authentication based on multimodal biometrics (MFA-MB) for Cloud Computing

2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), 2015

Cloud Computing (CC) was introduced recently as a new paradigm to host and deliver Information Technology Services. Despite its advantages and maturity, security and privacy issues in CC remain an open challenge. Usually, cloud- based systems use login and password combination, PINs, smart cards, or unimodal biometrics for users authentication; Multimodal biometrics can be considered as an alternative solution and ...


More Xplore Articles

Educational Resources on Multi-factor Authentication

Back to Top

IEEE.tv Videos

Threat Hunters, Multi-factor Authentification and Mental Agility - Cybersecurity in a Hyperconnected World
IEEE Authoring Part 8: Impact Factor
IMS 2014: Broadband Continuous-mode Power Amplifiers
"Do you trust me?" vs "Can I trust you?" Root of Trust Within My Connected Symbiotic Autonomous Systems - John Budenske
MicroApps: Recent Improvement on Y-Factor Noise Figure Measurement Uncertainty (Agilent Technologies)
An Introduction to Computational Intelligence in Multi-Criteria Decision-Making: The Intersection of Search, Preference Tradeoff
David Kravitz: Blockchain-Compatible Identity and Access Management for IoT - Special Session on SIoT: WF-IoT 2016
IMS 2011 Microapps - IQ Mixer Measurements: Techniques for Complete Characterization of IQ Mixers Using a Multi-Port Vector Network Analyzer
Addressing Key Test Challenges for LTE/LTE- A Multi-Antenna Beamforming Designs: MicroApps 2015 - Keysight Technologies
Multi-Level Optical Weights in Integrated Circuits - IEEE Rebooting Computing 2017
Collaborative Filtering III
A Wideband Single-PLL RF Receiver for Simultaneous Multi-Band and Multi-Channel Digital Car Radio Reception: RFIC Industry Showcase
How to Publish a Technical Paper with IEEE: Part 3 - Ethics, Where to Publish, Open Access & Impact Factor
Fuzzy and Soft Methods for Multi-Criteria Decision Making - Ronald R Yager - WCCI 2016
ITEC 2014: Moving Toward an Optimal Electrified Propulsion Unit: A Multi-Physics Approach
A 20dBm Configurable Linear CMOS RF Power Amplifier for Multi-Standard Transmitters: RFIC Industry Showcase
IMS MicroApps: Multi-Rate Harmonic Balance Analysis
Introduction to Chip Multiprocessor Architecture
Research Trends in Evolutionary Multi-Objective Optimization: Past, Present and Future
Achieving Balance Between Convergence and Diversity in Evolutionary Multi-Objective Optimization - Ke Li

IEEE-USA E-Books

  • Mobile multi-factor authentication

    Security has always been an important topic when it comes to the communication of sensitive data. With hardware advances allowing users the advantage of accessibility used in mobile devices, individuals are now spending more and more time on these devices. Additionally, with the viral popularity of social media applications and single sign-on, users do not always take as many precautions as needed with their information. Multi-factor authentication creates more and varied walls to block out the wrong people from seeing your information. Three-factor authentication can be applied to mobile devices as the first factor is already built in.

  • Database multi-factor authentication via pluggable authentication modules

    Authentication schemes containing single factors are becoming increasingly inadequate for many applications. This paper describes the use of Pluggable Authentication Modules as a means of creating a multi-factor authentication scheme for a MySQL database. The resulting scheme is one with a significantly higher degree of security.

  • Multi-factor authentication using threshold cryptography

    Multi-Factor Authentication is used as a foolproof solution to various issues involved in present day critical authentication systems. However, it comes with the overhead of employing multiple authentication programs to complete the process. Moreover, current multi-factor authentication schemes require all intermediate One Time Passwords(OTPs) to be stored for the lifetime of the authentication process. They also involve security risks whenever an authentication process requires the user's password at a public place like a Point-of-Sale terminal or an open ATM booth. This work proposes a more secure, efficient, convenient and flexible multi-factor authentication technique using threshold cryptography.

  • Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing

    Mobile cloud computing is a new computing technology, which provides on-demand resources. Nowadays, this computing paradigm is becoming one the most interesting technology for IT enterprises. The idea of computing and offloading data in cloud computing is utilized to overcome the inherent challenges in mobile computing. This is carried out by utilizing other resource providers besides the mobile device to host the delivery of mobile applications. However, this technology introduces some opportunities as new computing concept, several challenges, including security and privacy are raised from the adoption of this IT paradigm. Authentication plays an important role to mitigate security and privacy issue in the mobile cloud computing. Even some authentication algorithms are proposed for mobile cloud computing, but most of these algorithms designed for traditional computing models, and are not using cloud capabilities. In mobile cloud computing, we access to pooled computation resources and applying more complicated authentication schemes is possible. Using different authentication factors, which is called multi-factor authentication algorithms, has been proposed for various areas. In this paper, feasibility of implementation of different kinds of multi-factor authentication protocols are discussed. Furthermore, the security and privacy of these algorithms are analyzed. Finally, some future directions are recommended.

  • Multi-factor authentication based on multimodal biometrics (MFA-MB) for Cloud Computing

    Cloud Computing (CC) was introduced recently as a new paradigm to host and deliver Information Technology Services. Despite its advantages and maturity, security and privacy issues in CC remain an open challenge. Usually, cloud- based systems use login and password combination, PINs, smart cards, or unimodal biometrics for users authentication; Multimodal biometrics can be considered as an alternative solution and additional factor to increase CC authentication security level. First, the paper deals with the authentication security in CC and proposes a new approach to implement a multimodal biometric systems for authentication and identity management using user's physiological and/or behavioral traits. Second, combining the advantages of multi-factor and multimodal biometric techniques we develop a hybrid scheme called Multi-factor Authentication based on Multimodal Biometrics (MFA-MB) in order to authenticate and allow access for cloud consumers. Further, a classification of different practical multiple biometrics combinations is given for a wide number of MFA-MB real applications.

  • Mobile phone multi-factor authentication with robustness of clone detection

    In this paper, we formulate the basic requirements for the novel security architecture and introduce provable experience authentication factor of the mobile device which is dual with respect to the “social network” authentication factor of the user. A method of multi-factor authentication of the device is proposed which allows effective blocking of clones in cellular networks and doesn't require any changes in the mobile device construction.

  • Design and implementation of mobile access system based on multi-factor authentication

    Nowadays the mobile equipment has become an essential tool of providing access to business resources from the organization's internal network and other services. Hence the security of wireless communication becomes more and more important. This paper demonstrates how to implement a mobile access system based on multi-factor authentication for security mobile communication,at the same time, improving IKE process to make the system more efficient.

  • Cyber-physical systems security through multi-factor authentication and data analytics

    We are living in a society where technology is present everywhere we go. We are striving towards smart homes, smart cities, Internet of Things, Internet of Everything. Not so long ago, a password was all you needed for secure authentication. Nowadays, even the most complicated passwords are not considered enough. Multi-factor authentication is gaining more and more terrain. Complex system may also require more than one solution for real, strong security. The present paper proposes a framework based with MFA as a basis for access control and data analytics. Events within a cyber-physical system are processed and analyzed in an attempt to detect, prevent and mitigate possible attacks.

  • Pick location security: Seamless integrated multi-factor authentication

    Authentication is one of the key aspects of securing applications and systems alike. While in most existing systems this is achieved using usernames and passwords it has been continuously shown that this authentication method is not secure. Studies that have been conducted have shown that these systems have vulnerabilities which lead to cases of impersonation and identity theft thus there is need to improve such systems to protect sensitive data. In this research, we explore the combination of the user's location together with traditional usernames and passwords as a multi factor authentication system to make authentication more secure. The idea involves comparing a user's mobile device location with that of the browser and comparing the device's Bluetooth key with the key used during registration. We believe by leveraging existing technologies such as Bluetooth and GPS we can reduce implementation costs whilst improving security.

  • A new mobile-based multi-factor authentication scheme using pre-shared number, GPS location and time stamp

    Lots of Web accounts are being hacked everyday even though the public Web servers like Gmail, Yahoo and Hotmail deploy the best-known security mechanisms. However, attacks usually happen due to personal faults. It is too difficult to hack the Gmail or Yahoo servers, but usually attackers try to gain access to user's system itself to get some information about his password. In this paper a new mechanism of securing Web accounts is proposed to overcome these personal faults. It enhances security by generating a secret hash code based on a pre-shared number and user's current GPS location.



Standards related to Multi-factor Authentication

Back to Top

No standards are currently tagged "Multi-factor Authentication"


Jobs related to Multi-factor Authentication

Back to Top