Multi-factor authentication (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Multi-factor authentication" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
11th place
8th place
800th place
676th place
8,888th place
6,276th place
5th place
5th place
272nd place
225th place
193rd place
152nd place
low place
low place
low place
low place
355th place
454th place
222nd place
297th place
1,185th place
840th place
low place
low place
low place
low place
12th place
11th place
5,032nd place
3,357th place
6,117th place
4,815th place
786th place
558th place
2,742nd place
1,754th place
4,991st place
4,317th place
1,060th place
700th place
1,216th place
797th place
69th place
59th place
low place
low place
68th place
117th place
1,110th place
695th place
17th place
15th place
390th place
227th place
616th place
430th place
4,767th place
3,136th place
34th place
27th place
low place
low place
low place
low place
6,171st place
4,055th place
low place
low place
2,921st place
2,118th place
388th place
265th place

9to5mac.com

acm.org

dl.acm.org

arstechnica.com

arxiv.org

bellingcat.com

bleepingcomputer.com

cnet.com

cujournal.com

darkreading.com

dhs.gov

doi.org

  • Russell, Steve (2023-02-22). "Bypassing Multi-Factor Authentication". ITNOW. 65 (1): 42–45. doi:10.1093/combul/bwad023. ISSN 1746-5702.
  • Jacomme, Charlie; Kremer, Steve (February 1, 2021). "An Extensive Formal Analysis of Multi-factor Authentication Protocols". ACM Transactions on Privacy and Security. 24 (2). New York City: Association for Computing Machinery: 1–34. doi:10.1145/3440712. ISSN 2471-2566. S2CID 231791299.
  • Cao, Liling; Ge, Wancheng (2015-03-10). "Analysis and improvement of a multi-factor biometric authentication scheme: Analysis and improvement of a MFBA scheme". Security and Communication Networks. 8 (4): 617–625. doi:10.1002/sec.1010.
  • Toorani, Mohsen; Beheshti, A. (2008). "SSMS - A secure SMS messaging protocol for the m-payment systems". 2008 IEEE Symposium on Computers and Communications. pp. 700–705. arXiv:1002.3171. doi:10.1109/ISCC.2008.4625610. ISBN 978-1-4244-2702-4. S2CID 5066992.
  • Siadati, Hossein; Nguyen, Toan; Gupta, Payas; Jakobsson, Markus; Memon, Nasir (2017). "Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication". Computers & Security. 65: 14–28. doi:10.1016/j.cose.2016.09.009. S2CID 10821943.

espacenet.com

worldwide.espacenet.com

  • EP 0745961, "Transaction authorization and alert system", issued 1996-12-04 
  • US 6078908, Schmitz, Kim, "Method for authorizing in data transmission systems" 
  • US 5708422, Blonder, et al., "Transaction authorization and alert system" 

europa.eu

data.europa.eu

ffiec.gov

iacr.org

eprint.iacr.org

indiatimes.com

economictimes.indiatimes.com

kaspersky.com

livemint.com

nist.gov

nist.gov

pages.nist.gov

pcisecuritystandards.org

pcmag.com

qz.com

rand.org

sans.org

sap.com

blogs.sap.com

schneier.com

semanticscholar.org

api.semanticscholar.org

sonicwall.com

theguardian.com

thehackernews.com

theregister.co.uk

venturebeat.com

washingtonpost.com

voices.washingtonpost.com

web.archive.org

wiley.com

onlinelibrary.wiley.com

wiley.com

wired.com

worldcat.org

search.worldcat.org

  • Russell, Steve (2023-02-22). "Bypassing Multi-Factor Authentication". ITNOW. 65 (1): 42–45. doi:10.1093/combul/bwad023. ISSN 1746-5702.
  • Jacomme, Charlie; Kremer, Steve (February 1, 2021). "An Extensive Formal Analysis of Multi-factor Authentication Protocols". ACM Transactions on Privacy and Security. 24 (2). New York City: Association for Computing Machinery: 1–34. doi:10.1145/3440712. ISSN 2471-2566. S2CID 231791299.

zdnet.com