Multilevel Authentication for Social Network
DOI: http://dx.doi.org/10.30630/joiv.2.3-2.146
Abstract
Keywords
Full Text:
PDFReferences
P. K. Ryan, Social Networking. New York: rosen central, 2011.
B.E. Nicole and D.M. Boyd, “Social Network Sites: Definition, History, and Scholarship,†Journal of Computer-Mediated Communication, vol. 13, pp. 210-230, 2008.
P. Kallas. (2016)Top 15 Most 2008Popular Social Networking Sites (and 10 Apps!). [Online]. Available: http://www.dreamgrow.com/top-15-most-popular-social-networking-sites/
M. A. Burrows. (1990) A logic of authentication. [Online]. Available: https://arxiv.org/ftp/arxiv/papers/1506/1506.03753.pdf
B. Dickson. (2016) 5 authentication methods putting passwords to shame. [Online]. Available: http://thenextweb.com/insider/2016/03/31/5-technologies-will-flip-world-authentication-head/
Findandtrace. (2015) Twitter Most downloaded and popular android apps in the world. [Online]. Available: http://www.findandtrace.com/telenews/twitter-most-downloaded-and-popular-android-apps-in-the-world/
Sameer. (2014) Advantages and Disadvantages of Twitter. [Online]. Available: http://www.muchtech.org/2014/04/advantages-and-disadvantages-of-twitter.html
M. Sarah. (2015) Instagram review. [Online]. Available: https://www.cnet.com/products/instagram-android/review/
C. J. P. Jaymar. (2013) Google+ (Android) review. [Online]. Available:https://www.cnet.com/products/google-plusandroid/review/
K. Burnham. (2015) How the top social networks compare on privacy -- in one handy chart. [Online]. Available: http://www.itworld.com/article/2915175/social-networking/how-the-top-social-networks-compare-on-privacy-in-one-handy-chart.html
D. Glenn. (2012) The History of Social Media from 1978 – 2012 [Infographic]. [Online]. Available: http://www.webmasterview.com/2011/08/social-networking-history/
C. Hoffman. (2015) The Best Two-Step Authentication: SMS, Autheticator Apps, and More. [Online]. Available: https://support.steampowered.com/kb_article.php?ref=4020-ALZM-5519
C. Larman, Agile and Iterative Development- A Manager's Guide. Pearson Education, 2004.
N.S.K. Tanvi, â€Multi-Dimensional and Multi-Level Authentication,†International Journal of Computer Application (0975 – 8887), vol. 75(12), pp. 17-22, Aug. 2013.