Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Two-Factor Authentication and Its Adaptation to Online Education Systems

Version 1 : Received: 5 June 2017 / Approved: 6 June 2017 / Online: 6 June 2017 (09:04:47 CEST)

How to cite: Karakaş, E.; Öztozlu, İ.; Erol, V. Two-Factor Authentication and Its Adaptation to Online Education Systems. Preprints 2017, 2017060036. https://doi.org/10.20944/preprints201706.0036.v1 Karakaş, E.; Öztozlu, İ.; Erol, V. Two-Factor Authentication and Its Adaptation to Online Education Systems. Preprints 2017, 2017060036. https://doi.org/10.20944/preprints201706.0036.v1

Abstract

This study examines the evolution of the two-factor authentication method and its adaptability to the online education system. Two-factor authentication is a security measure used especially in areas where information such as banking is valuable. Parallel to technological developments, it has developed as much as daily. It aims to take security one step forward because it is composed of two phases. Today, banking, IOT devices, public transport tickets and many other areas are used. Two-factor authentication methods against security attacks in the field of information are also being updated. In recent years, new technologies such as biometric (iris pattern, retinal pattern, etc.) or behavioral biometry (location tracking, walking information, touch speed etc.) were studied. Instead of physically studying somewhere like going to a course in modern society, online trainings become more advantageous. Most of these online trainings are given certificates such as participation certificate, success certificate, etc. The main problem here is whether the person who is being certified is true. In the study conducted in line with these details, there is a proposal for the application of the Mimic Control Method with Sound Intensity (MCMSI) method for on-line training by examining the two-factor authentication techniques up to the day.

Keywords

two-factor authentication; online training; biological and behavioral features; mimic control method with sound intensity

Subject

Computer Science and Mathematics, Information Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.