Mobile phishing attacks and defence mechanisms: State of art and open research challenges

D Goel, AK Jain - computers & security, 2018 - Elsevier
Phishing is an online identity theft in which an attacker tries to steal user's personal
information, resulting in financial loss of individuals as well as organisations. Nowadays …

Authentication systems: A literature review and classification

MH Barkadehi, M Nilashi, O Ibrahim, AZ Fardi… - Telematics and …, 2018 - Elsevier
One of the most important parts of any system is authentication. Appreciated as the first and
the last line of defense in the great majority of cases, authentication systems can usually …

Duty-cycle-based controlled physical unclonable function

MJ Azhar, F Amsaad, S Köse - IEEE Transactions on Very …, 2018 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) provide a unique signature based on the variations
during the fabrication process of the integrated circuits. The additional features of …

[HTML][HTML] User perspective and security of a new mobile authentication method

P Laka, W Mazurczyk - Telecommunication systems, 2018 - Springer
This paper describes a new mobile authentication method which is based on an Open ID
Connect standard and subscriber identity module card. The proposed solution enables …

A national mobile identity management strategy for electronic government services

GM Verzeletti, ER de Mello… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
The purpose of electronic government (e-Gov) programs is to promote government
transparency and improve interactions with its citizens. One of the strategies used by …

[PDF][PDF] Users' acceptance of using biometric authentication system for Bahrain mobile banking

Z Mirza, E Alsalem, F Mohsin, WM Elmedany - KnE Engineering, 2018 - knepublishing.com
The mobile banking authentication is considered as a major security risk for the financial
sector; this risk can affect their interest, hence the purpose of this study is to evaluate the …

A mobile identity management system to enhance the Brazilian electronic government

GM Verzeletti, ER de Mello… - IEEE Latin America …, 2018 - ieeexplore.ieee.org
One of the strategies used by governments to enhance eGovernment Programs (eGov) is to
define an Electronic Identity Management (IdM) system. Brazil has not yet defined a National …

[图书][B] Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications

MJ Azhar - 2018 - search.proquest.com
Duty cycle and frequency are important characteristics of periodic signals that are exploited
to develop a variety of application circuits in IC design. Controlling the duty cycle and …