S Kiljan, H Vranken, M van Eekelen - Future Generation Computer Systems, 2018 - Elsevier
Authentication is a major research topic in the information security field. Much has been written about assessing entity (user) authentication methods, but there is a lack of literature …
D Weinshall - 2006 IEEE Symposium on Security and Privacy …, 2006 - ieeexplore.ieee.org
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish …
N Siddiqui, L Pryor, R Dave - Proceedings of International Conference on …, 2021 - Springer
With the recent advancements in technology, more and more people rely on their personal devices to store their sensitive information. Concurrently, the environment in which these …
Cryptographic systems often rely on the secrecy of cryptographic keys given to users. Many schemes, however, cannot resist coercion attacks where the user is forcibly asked by an …
Implicit authentication (IA) uses behavioural biometrics to provide continuous authentication on smartphones. IA has been advocated as more usable when compared to traditional …
CS Weir, G Douglas, M Carruthers, M Jack - computers & security, 2009 - Elsevier
This research compared three different two-factor methods of eBanking authentication. Three devices employing incremental security layers in the generation of one time …
K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured with 2FA typically requires an individual to authenticate using something they know …
K Viswanathan, A Yazdinejad - arXiv preprint arXiv:2201.02563, 2022 - arxiv.org
There is a growing need for authentication methodology in virtual reality applications. Current systems assume that the immersive experience technology is a collection of …
A key challenge in online education is the difficulty in ensuring the authenticity of remote test takers during online exams. This chapter discusses how such challenge can be addressed …