Series-1 (May - Jun. 2024)May - Jun. 2024 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
ABSTRACT: The multiplication is one of the most important arithmetic function in Digital signal processing, ALU and various communication systems. The Multiplication method require more hardware resources and more time than other arithmetic and logical circuits such as Addition, Subtraction etc. But the need for fast computation along with low on chip area and the low power dissipation is increased in recent times. In recent years....
Keywords: Vedic Multiplier, 180 nm, Cadence Virtuoso, Transistor count
[1]
M. Durga Madhuri, G. Sweta Sree, D. Raghunadh, G. Panduranga Vittal,And Ch.Suryanarayana5. Implementation Of High Speed Vedic Multiplier. International Journal Of Innovative Science And Research Technology, 2, 2017.
[2]
Ahsan Rafiq, Shabbir Majeed Chaudhry, Kamran Sadiq Awan And Muhammad Usman. An Efficient Architecture Of Modified Booth Multiplier Using Hybrid Adder. In 2021 International Bhurban Conference On Applied Sciences And Technologies (Ib- Cast), Pages 648–656, 2021.
[3]
J. Jayakumar. Design Of Low Power Multiplier Using Cadence Tool. International Journal For Technological Research In Engineering, Volume 3, March-2016.
[4]
V. Rajmohan And O. Uma Maheswari. Low Power Modified Wallace Tree Multiplier Using Cadence Tool. World Engineering& Applied Sciences Journal, L 7, 2016.
[5]
Er. Harjinder Singh, Er. Mandeep Sing And Er. Gaurav Mittal . Design Of Low Power Vedic Multiplier By Using 180nm Technology. Internatonal Journal Of Innovative Research In Technology, 1:25–31, 2014.
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: Securing online transactions through the implementation of Multi-Factor Authentication (MFA) is a paramount concern in an organization or business enterprise's. The research reviews, understanding, emphasized and applying different MFA types, such as knowledge factors (something you know), possession factors (something you have), and inherence factors (something you are), to fortify online financial security within Abakaliki metropolis of Ebony State- Nigeria.. It also addressed regulatory and compliance considerations related to MFA across various industries, providing a clear view of the subject with the area under study. The research depicts a comprehensive understanding of how to enhance online transaction security using Multi-Factor Authentication within Abakaliki Metropolitan area of Ebonyi State- Nigeria.
Keywords: Multi-factor, Authentication, Online, Transaction, Ebonyi-State
[1]. Aloul, F. (2012). Two Factor Authentication Using Mobile Phones. 2012 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA).
[2]. Bonneau, J.; Herley, C.; Van Oorschot, P.C.; Stajano, F. Passwords and the Evolution of Imperfect Authentication. Commun. ACM 2015, 58, 78–87. [Google Scholar] [CrossRef]
[3]. Dimitrios C. Tselios, Ilias K. Savvas and M-Tahar Kechadi (2016). International Journal of Monitoring and Surveillance Technologies Research (pp. 42-61).
[4]. Florencio, D., & Herley, C. (2007). A Large-Scale Study of Web Password Habits. Proceedings of the 16th International Conference on World Wide Web.
[5]. Gunson, N.; Marshall, D.; Morton, H.; Jack, M. User Perceptions of Security and Usability of Single-Factor and Two-Factor Authentication in Automated Telephone Banking. Comput. Secur. 2011, 30, 208–220. [Google Scholar] [CrossRef].