D Preuveneers, W Joosen - Proceedings of the 30th annual ACM …, 2015 - dl.acm.org
As recent incidents have shown, weak passwords are a severe security risk for authenticating users and granting access to protected resources. Additionally, strong …
Y Ashibani, D Kauling… - 2017 IEEE 30th Canadian …, 2017 - ieeexplore.ieee.org
There has been a recent rapid increase in the number of Internet of Things (IoT) devices, providing a wide range of services for smart homes such as surveillance cameras, smart …
User location can act as an additional factor of authentication in scenarios where physical presence is required, such as when making in-person purchases or unlocking a vehicle …
JE Bardram, RE Kjær, MØ Pedersen - … , Seattle, WA, USA, October 12-15 …, 2003 - Springer
This paper explores computer security in pervasive computing with focus on user authentication. We present the concept of Proximity-Based User Authentication, as a …
O Riva, C Qin, K Strauss… - 21st USENIX Security …, 2012 - usenix.org
Mobile users are often faced with a trade-off between security and convenience. Either users do not use any security lock and risk compromising their data, or they use security locks but …
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last few years, providing a wide range of services such as camera feeds, light controls, and door …
J Thorpe, B MacRae, A Salehi-Abari - … of the Ninth symposium on usable …, 2013 - dl.acm.org
We design, implement, and evaluate GeoPass: an interface for digital map-based authentication where a user chooses a place as his or her password (ie, a" location …
M Jakobsson, E Shi, P Golle, R Chow - Proceedings of the 4th USENIX …, 2009 - usenix.org
We introduce the notion of implicit authentication–the ability to authenticate mobile users based on actions they would carry out anyway. We develop a model for how to perform …
Mobile two-factor authentication (2FA) has become commonplace along with the popularity of mobile devices. Current mobile 2FA solutions all require some form of user effort which …