Multi-factor authentication (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Multi-factor authentication" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
69th place
59th place
11th place
8th place
800th place
676th place
8,888th place
6,276th place
5th place
5th place
272nd place
225th place
193rd place
152nd place
786th place
558th place
low place
low place
low place
low place
6,171st place
4,055th place
3,700th place
2,360th place
355th place
454th place
222nd place
297th place
1,185th place
840th place
low place
low place
low place
low place
12th place
11th place
5,032nd place
3,357th place
6,117th place
4,815th place
low place
low place
2,742nd place
1,754th place
4,991st place
4,317th place
1,060th place
700th place
1,216th place
797th place
low place
low place
68th place
117th place
1,110th place
695th place
17th place
15th place
390th place
227th place
616th place
430th place
4,767th place
3,136th place
34th place
27th place
low place
low place
low place
low place
low place
low place
187th place
146th place
low place
low place
2,921st place
2,118th place
388th place
265th place

9to5mac.com (Global: 2,742nd place; English: 1,754th place)

acm.org (Global: 1,185th place; English: 840th place)

dl.acm.org

arstechnica.com (Global: 388th place; English: 265th place)

arxiv.org (Global: 69th place; English: 59th place)

  • Meyer, L. A.; Romero, S.; Bertoli, G.; Burt, T.; Weinert, A.; Ferres, J. L. (2023). "How effective is multifactor authentication at deterring cyberattacks?". arXiv:2305.00945 [cs.CR].
  • Toorani, Mohsen; Beheshti, A. (2008). "SSMS - A secure SMS messaging protocol for the m-payment systems". 2008 IEEE Symposium on Computers and Communications. pp. 700–705. arXiv:1002.3171. doi:10.1109/ISCC.2008.4625610. ISBN 978-1-4244-2702-4. S2CID 5066992.
  • Amft, S.; Höltervennhoff, S.; Huaman, N.; Krause, A.; Simko, L.; Acar, Y.; Fahl, S. (2023). ""We've Disabled MFA for You": An evaluation of the security and usability of multi-factor authentication recovery deployments". arXiv:2306.09708 [cs.CR].

bellingcat.com (Global: 4,991st place; English: 4,317th place)

bleepingcomputer.com (Global: 6,171st place; English: 4,055th place)

cnet.com (Global: 272nd place; English: 225th place)

csoonline.com (Global: low place; English: low place)

cujournal.com (Global: low place; English: low place)

darkreading.com (Global: low place; English: low place)

dhs.gov (Global: 4,767th place; English: 3,136th place)

doi.org (Global: 2nd place; English: 2nd place)

  • Russell, Steve (2023-02-22). "Bypassing Multi-Factor Authentication". ITNOW. 65 (1): 42–45. doi:10.1093/combul/bwad023. ISSN 1746-5702.
  • Jacomme, Charlie; Kremer, Steve (February 1, 2021). "An Extensive Formal Analysis of Multi-factor Authentication Protocols". ACM Transactions on Privacy and Security. 24 (2). New York City: Association for Computing Machinery: 1–34. doi:10.1145/3440712. ISSN 2471-2566. S2CID 231791299. Archived from the original on August 3, 2023. Retrieved February 27, 2021.
  • Cao, Liling; Ge, Wancheng (2015-03-10). "Analysis and improvement of a multi-factor biometric authentication scheme: Analysis and improvement of a MFBA scheme". Security and Communication Networks. 8 (4): 617–625. doi:10.1002/sec.1010. Archived from the original on 2022-11-25. Retrieved 2022-03-20.
  • Toorani, Mohsen; Beheshti, A. (2008). "SSMS - A secure SMS messaging protocol for the m-payment systems". 2008 IEEE Symposium on Computers and Communications. pp. 700–705. arXiv:1002.3171. doi:10.1109/ISCC.2008.4625610. ISBN 978-1-4244-2702-4. S2CID 5066992.
  • Siadati, Hossein; Nguyen, Toan; Gupta, Payas; Jakobsson, Markus; Memon, Nasir (2017). "Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication". Computers & Security. 65: 14–28. doi:10.1016/j.cose.2016.09.009. S2CID 10821943.

duosecurity.com (Global: low place; English: low place)

espacenet.com (Global: 800th place; English: 676th place)

worldwide.espacenet.com

  • EP 0745961, "Transaction authorization and alert system", issued 1996-12-04 
  • US 6078908, Schmitz, Kim, "Method for authorizing in data transmission systems" 
  • US 5708422, Blonder, et al., "Transaction authorization and alert system" 

europa.eu (Global: 68th place; English: 117th place)

data.europa.eu

ffiec.gov (Global: low place; English: low place)

iacr.org (Global: 5,032nd place; English: 3,357th place)

eprint.iacr.org

indiatimes.com (Global: 17th place; English: 15th place)

economictimes.indiatimes.com

kaspersky.com (Global: low place; English: low place)

livemint.com (Global: 390th place; English: 227th place)

nist.gov (Global: 355th place; English: 454th place)

nist.gov

pages.nist.gov

pcisecuritystandards.org (Global: low place; English: low place)

pcmag.com (Global: 1,060th place; English: 700th place)

qz.com (Global: 1,110th place; English: 695th place)

rand.org (Global: 2,921st place; English: 2,118th place)

sans.org (Global: low place; English: low place)

sap.com (Global: 6,117th place; English: 4,815th place)

blogs.sap.com

schneier.com (Global: 8,888th place; English: 6,276th place)

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

sonicwall.com (Global: low place; English: low place)

techcrunch.com (Global: 187th place; English: 146th place)

theguardian.com (Global: 12th place; English: 11th place)

thehackernews.com (Global: low place; English: low place)

theregister.co.uk (Global: 1,216th place; English: 797th place)

theregister.com (Global: 3,700th place; English: 2,360th place)

venturebeat.com (Global: 616th place; English: 430th place)

washingtonpost.com (Global: 34th place; English: 27th place)

voices.washingtonpost.com

web.archive.org (Global: 1st place; English: 1st place)

wiley.com (Global: 222nd place; English: 297th place)

onlinelibrary.wiley.com

wiley.com

wired.com (Global: 193rd place; English: 152nd place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org

  • Russell, Steve (2023-02-22). "Bypassing Multi-Factor Authentication". ITNOW. 65 (1): 42–45. doi:10.1093/combul/bwad023. ISSN 1746-5702.
  • Jacomme, Charlie; Kremer, Steve (February 1, 2021). "An Extensive Formal Analysis of Multi-factor Authentication Protocols". ACM Transactions on Privacy and Security. 24 (2). New York City: Association for Computing Machinery: 1–34. doi:10.1145/3440712. ISSN 2471-2566. S2CID 231791299. Archived from the original on August 3, 2023. Retrieved February 27, 2021.

zdnet.com (Global: 786th place; English: 558th place)