Publisher
Springer Nature Switzerland
Reference42 articles.
1. Dasgupta, D., Roy, A., Nag, A., Dasgupta, D., Roy, A., Nag, A.: Multi-factor authentication: more secure approach towards authenticating individuals. In: Advances in User Authentication, pp. 185–233 (2017)
2. Liu, X.M.: A risk-based approach to cybersecurity: a case study of financial messaging networks data breaches. Coast. Bus. J. 18(1), 2 (2021)
3. Mohammed, I.A.: Cloud identity and access management–a model proposal. Int. J. Innov. Eng. Res. Technol. 6(10), 1–8 (2019)
4. Sagar, G., Syrovatskyi, V.: Information security: safeguarding resources and building trust. In: Technical Building Blocks: A Technology Reference for Real-world Product Development, pp. 275–324. Apress, Berkeley (2022)
5. Gao, N., et al.: Modeling and analysis of port supply chain system based on fabric blockchain. Comput. Ind. Eng. 172, 108527 (2022)