This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
- 825 views
- 2304 downloads
Comparative Analysis of Top 5, 2-Factor Authentication Solutions
-
- Author(s) / Creator(s)
-
The risk of online personal information breaches is increasing as people put more critical data online., strong authentication protecting this information is not being adopted quickly enough to deal with the threat. Online security specialists recommend people should use two-factor authentication (2FA) on password-protected systems to help to eliminate the account breach. Two-factor authentication (2FA) aims to enhance the resilience of password-based authentication, typically requiring an individual to authenticate using something they know as well as something they have for example a code generated by software token or with use of hardware token along with password. (As cited in abstract.) *Publication date not found.
-
- Date created
- 2021-10-29
-
- Subjects / Keywords
-
- Type of Item
- Report