Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–9 dari 9 artikel
Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability
Irenna Wanisha
; James, Jaymaxcklien Bravyain
; Witeno, Jeremy Silas
; Mohammad Bakery, Luqmanul Hakim
; Samuel, Melvianna
; Muhammad Faisal
International Journal of Computer Technology and Science
Vol 1
, No 3
(2024)
In the ever-changing digital world, strong security protocols are essential. As a vital line of defence against unwanted access, blockchain uses several verification techniques to boost security. This article investigates the use of blockchain technology to tackle privacy, security, and usability issues. By reducing the dangers associated with conventional centralised systems, blockchain's decentralised and immutable structure offers a secure platform for storing and verifying authentication cre...
Sumber Asli
Google Scholar
DOI
Enhancing Authentication Security: Analyzing Time-Based One-Time Password Systems
Asyura Binti Sofian
; Ayu Fitri Alafiah Binti Peradus
; Fidel Yong
; Irvine Shearer
; Nurrul Nazwa Binti Ismail
; Yugendran A/L Mahendran
; Muhammad Faisal
International Journal of Computer Technology and Science
Vol 1
, No 3
(2024)
This paper explores the Time-Based One-Time Password (TOTP) authentication mechanism enhanced with lightweight cryptographic algorithms, presenting it as an advanced solution to the limitations of traditional OTP systems. There are a lot of applications and systems where this mechanism is applied. For example, bank applications, e-commerce websites, access control system, healthcare system, etc. TOTP generates dynamic, time-sensitive passwords using the current time and a secret key processed th...
Sumber Asli
Google Scholar
DOI
Advancements in Multi-Factor Authentication: A Quantum-Resilient and Federated Approach for Enhanced Security
Nur Syahrina Binti Juni
; Grasila Huney Wan
; Siti Aisyah Nabilah Binti Banchi
; Estella Blessings
; Venetha A/P Loganathan
; Muhammad Faisal
International Journal of Computer Technology and Science
Vol 1
, No 3
(2024)
The Internet of Things (IoT) phenomenon is centered around linking various devices and objects to the Internet, enabling them to communicate, collect, and exchange data [1]. The IoT needs strong, lightweight, and secure authorization schemes to regulate many devices with varying levels of ability. Quantum-resilient federated Multi-Factor Authentication (QRF-MFA) is a solution presented in this paper to address the above-discussed issues. Featuring quantum-resistant cryptographic protocols, high-...
Sumber Asli
Google Scholar
DOI
Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology
Rebecca Ling Ze Siew
; Brendan Chan Kah Le
; Lee Kai Yue
; Nuri Nazirah Binti Ismail
; Xavier Liong Zhi Hao
; Muhammad Faisal
International Journal of Computer Technology and Science
Vol 1
, No 4
(2024)
The rapid advancement of Industrial Internet of Things (IIoT) technology necessitates robust authentication solutions to ensure security, scalability, and efficiency. This project, titled "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain," examines various blockchain-based authentication methods for IIoT and identifies their strengths and weaknesses. Despite the enhanced security and decentralized nature of blockchain, issues such as scalability, high latency,...
Sumber Asli
Google Scholar
DOI
Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme
Azreen Shafieqah Asri
; Faizatul Fitri Boestamam
; Harith Zakwan Bin Zakaria
; Mohammad Amir Alam Rahim Omar
; Mohammad Hamka Izzuddin Bin Mohamad Yahya
; Muhammad Faisal
International Journal of Computer Technology and Science
Vol 1
, No 3
(2024)
With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensuring robust security measures is essential. While blockchain has shown the potential to upgrade traditional authentication methods in IIoT environments, vulnerabilities persist. This paper introduces two innovative methods to enhance blockchain-based authentication in IIoT: first, integrating AI-driven anomaly and thre...
Sumber Asli
Google Scholar
DOI
Blockchain-Enhanced Multi-Factor Authentication for Securing IIoT
Allyson Eddy
; Bram Zoe anak Guillan
; Einstein Kent Elias
; Eldren Aniell
; Shircrayson bin Simon
; Muhammad Faisal
International Journal of Electrical Engineering, Mathematics and Computer Science
Vol 1
, No 3
(2024)
This paper proposes Blockchain-Enhanced Multi-Factor Authentication (BEMFA) to address the limitations of existing authentication mechanisms in the Industrial Internet of Things (IIoT). BEMFA combines multi-factor authentication (MFA) with blockchain technology to ensure robust, scalable, and tamper-resistant security tailored to IIoT environments. This method dynamically manages roles and permissions, detects malicious devices, and ensures data integrity and authenticity. Our results demonstrat...
Sumber Asli
Google Scholar
DOI
Enhancing Aspects of IIoT Networks with Federated Learning Blockchain Integrated Authentication Solution
Ling, Fang Ting
; Ng Hui Wen
; Tsi Shi Ping
; Vivian Bong Chiaw Cin
; Yew Wei Yi
; Muhammad Faisal
International Journal of Electrical Engineering, Mathematics and Computer Science
Vol 1
, No 3
(2024)
The Industrial Internet of Things (IIoT) faces various challenges in ensuring secure communication, authentication, and data integrity due to its distributed nature and evolving threat landscape. To address these issues, this paper proposes the integration of blockchain authentication as a robust solution to enhance security and reliability in IIoT networks. By leveraging Federated Learning with blockchain technology, the proposed solution aims to improve authentication mechanisms by training mo...
Sumber Asli
Google Scholar
DOI
Enhancing Security in Industrial IoT Through Blockchain-based Authentication Mechanisms
Phiang, Jun Kong
; Vivian Yong Siew Yee
; bin Hilmi, Hafizuddin
; Dedree Leonna Lai
; Ng Ee Zoe
; Muhammad Faisal
International Journal of Electrical Engineering, Mathematics and Computer Science
Vol 1
, No 3
(2024)
The Industrial Internet of Things (IIoT) has revolutionized industrial processes, offering automation and data-driven decision-making. However, this interconnectedness brings new security challenges, especially in crucial infrastructure sectors. Traditional security measures are inadequate, leading to the exploration of innovative solutions. Blockchain technology has emerged as a promising solution due to its decentralized and immutable nature. This paper proposes a Hybrid Blockchain-Based Authe...
Sumber Asli
Google Scholar
DOI
EDUCATION QUALITY ASSURANCE AND COMPARATIVE ACCREDITATION OF SCHOOLS
Muhartini, Muhartini
; Hairunnas, Hairunnas
; Muhammad Faisal
International Journal of Education and Literature
Vol 1
, No 3
(2022)
This study aims to determine the quality assurance of education and comparative school accreditation. The method used in this paper is descriptive qualitative and literature study. The results showed that: 1) The measure of the quality of education in schools refers to the degree of excellence of each component, is relative, and always exists in comparison. 2) Steps to improve quality, namely; a) needs analysis, b) vision, mission, and objectives, c) resources for educators and education personn...
Sumber Asli
Google Scholar
DOI