Wearable activity trackers: A survey on utility, privacy, and security

K Salehzadeh Niksirat, L Velykoivanenko… - ACM Computing …, 2024 - dl.acm.org
Over the past decade, wearable activity trackers (WATs) have become increasingly popular.
However, despite many research studies in different fields (eg psychology, health, and …

Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking

MB Muzammil, M Bilal, S Ajmal, SC Shongwe… - IEEE …, 2024 - ieeexplore.ieee.org
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-
access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by …

Privacy-preservation techniques for IoT devices: a systematic mapping study

D Torre, A Chennamaneni, A Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …

Online Banking User Authentication Methods: A Systematic Literature Review

NA Karim, OA Khashan, H Kanaker… - IEEE …, 2023 - ieeexplore.ieee.org
Online banking has become increasingly popular in recent years, making it a target for
cyberattacks. Banks have implemented various user authentication methods to protect their …

PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone

Y Leguesse, C Colombo, M Vella… - IEEE …, 2021 - ieeexplore.ieee.org
The security of financial apps on smartphones is threatened by a class of advanced and
persistent malware that can bypass all existing security measures. Strong cryptography and …

Recurring verification of interaction authenticity within bluetooth networks

T Peters, TJ Pierson, S Sen, J Camacho… - Proceedings of the 14th …, 2021 - dl.acm.org
Although user authentication has been well explored, device-to-device authentication-
specifically in Bluetooth networks-has not seen the same attention. We propose Verification …

Analyzing Communications and Software Systems Security

PS Rao - 2023 - aaltodoc.aalto.fi
We rely on various communications and software systems where security is critical. Many of
these systems have transformed drastically over time with the addition of new features and …

Press ${@}{\$}{@}{\$} $ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures

P Shrestha, N Saxena, D Shukla… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
The use of wearable devices (eg, smartwatches) in two factor authentication (2FA) is fast
emerging, as wearables promise better usability compared to smartphones. Still, the current …

Privacy-Preservation Techniques for IoT: A Systematic Mapping Study

D Torre, A Chennamaneni, A Rodriguez - 2023 - apps.dtic.mil
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …

Panic buttons, shrugged shoulders and drowning email inboxes: Stories of account takeovers and trust

A Berglöf - 2022 - diva-portal.org
Users face many risks while being online, including ones posed by their own actions, such
as keeping the same passwords on multiple services. This makes them potential victims of …