Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | Aymen Iftikhar, 01-135201-114 | |
dc.contributor.author | Ahsan Javed, 01-235192-005 | |
dc.date.accessioned | 2024-03-11T04:49:42Z | |
dc.date.available | 2024-03-11T04:49:42Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://hdl.handle.net/123456789/17048 | |
dc.description | Supervised by Dr. Arif Ur Rehman | en_US |
dc.description.abstract | Two-factor authentication (2FA) is an important security measure that can be used to secure user access to websites and online services. Integrating blockchain technology with 2FA adds an extra degree of protection. The decentralised and tamper-proof structure of blockchain maintains the integrity of authentication data, lowering the danger of breaches or unauthorised access. By using blockchain for 2FA, OCCT will increase user trust and privacy by securely storing sensitive information in a decentralised ledger. The merging of technology promises the prospect of a safer online environment, shielding digital identities and sensitive data from the digital worldwide ever-present hazards. In the world of 2FA and blockchain integration, the decentralised structure of blockchain serves as an effective barrier against unauthorised access. In OCCT We will use blockchain that can store user authentication data such as something a user knows (password, token code) and the linked database will give user access to add and or change 2FA authorized data to access the account or something a user owns (such as a mobile device).in blockchain the distributed ledger records each transaction across numerous nodes, will make it resistant to single points of failure or breaches. As a result, bad actors will find it extremely difficult to change or corrupt the stored data, resulting in an authentication system with remarkable resilience. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Computer Sciences | en_US |
dc.relation.ispartofseries | BS (IT);P-02155 | |
dc.subject | Two Factor | en_US |
dc.subject | Authentication | en_US |
dc.subject | Block Chain | en_US |
dc.title | Two Factor Authentication Using Block Chain | en_US |
dc.type | Project Reports | en_US |