Y Wang, IR Chen, DC Wang - Wireless Personal Communications, 2015 - Springer
As mobile computing has been developed for decades, a new model for mobile computing, namely, mobile cloud computing, emerges resulting from the marriage of powerful yet …
D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password authentication has been a subject of intensive research in the past two decades, and …
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which multiple users with complex social relationships interact with a single device. Currently …
EM Redmiles, N Warford, A Jayanti, A Koneru… - 29th USENIX Security …, 2020 - usenix.org
End users learn defensive security behaviors from a variety of channels, including a plethora of security advice given in online articles. A great deal of effort is devoted to getting users to …
D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what is the underlying distribution of user-generated passwords. In this paper, we make a …
K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured with 2FA typically requires an individual to authenticate using something they know …
Today's Internet services rely heavily on text-based passwords for user authentication. The pervasiveness of these services coupled with the difficulty of remembering large numbers of …
SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
Privacy and data protection constitute core values of individuals and of democratic societies. There have been decades of debate on how those values-and legal obligations-can be …