The current era extensively utilizes the Internet, which uses data. Due to the apparent open- access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by …
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life. The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
Online banking has become increasingly popular in recent years, making it a target for cyberattacks. Banks have implemented various user authentication methods to protect their …
The security of financial apps on smartphones is threatened by a class of advanced and persistent malware that can bypass all existing security measures. Strong cryptography and …
Although user authentication has been well explored, device-to-device authentication- specifically in Bluetooth networks-has not seen the same attention. We propose Verification …
We rely on various communications and software systems where security is critical. Many of these systems have transformed drastically over time with the addition of new features and …
P Shrestha, N Saxena, D Shukla… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
The use of wearable devices (eg, smartwatches) in two factor authentication (2FA) is fast emerging, as wearables promise better usability compared to smartphones. Still, the current …
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life. The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
Users face many risks while being online, including ones posed by their own actions, such as keeping the same passwords on multiple services. This makes them potential victims of …