Intelligence and security in big 5G-oriented IoNT: An overview

F Al-Turjman - Future Generation Computer Systems, 2020 - Elsevier
Abstract Internet of Nano-Things (IoNT) overcomes critical difficulties and additionally open
doors for wearable sensor based huge information examination. Conventional computing …

A survey of mobile cloud computing applications: Perspectives and challenges

Y Wang, IR Chen, DC Wang - Wireless Personal Communications, 2015 - Springer
As mobile computing has been developed for decades, a new model for mobile computing,
namely, mobile cloud computing, emerges resulting from the marriage of powerful yet …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

Rethinking Access Control and Authentication for the Home Internet of Things ({{{{{IoT}}}}})

W He, M Golla, R Padhi, J Ofek, M Dürmuth… - 27th USENIX Security …, 2018 - usenix.org
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which
multiple users with complex social relationships interact with a single device. Currently …

A comprehensive quality evaluation of security and privacy advice on the web

EM Redmiles, N Warford, A Jayanti, A Koneru… - 29th USENIX Security …, 2020 - usenix.org
End users learn defensive security behaviors from a variety of channels, including a plethora
of security advice given in online articles. A great deal of effort is devoted to getting users to …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

A usability study of five {two-factor} authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

[PDF][PDF] The tangled web of password reuse.

A Das, J Bonneau, M Caesar, N Borisov, XF Wang - NDSS, 2014 - cs.umd.edu
Today's Internet services rely heavily on text-based passwords for user authentication. The
pervasiveness of these services coupled with the difficulty of remembering large numbers of …

Is fido2 the kingslayer of user authentication? a comparative usability study of fido2 passwordless authentication

SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …

Privacy and data protection by design-from policy to engineering

G Danezis, J Domingo-Ferrer, M Hansen… - arXiv preprint arXiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …