S Babkin, A Epishkina - 2019 IEEE Conference of Russian …, 2019 - ieeexplore.ieee.org
Nowadays one-time passwords are used in a lot of areas of information technologies including e-commerce. A few vulnerabilities in authentication protocols based on one-time …
A plethora of sensors embedded in wearable, mobile, and infrastructure devices allow us to seamlessly capture large parts of our daily activities and experiences. It is not hard to …
D Mahansaria, UK Roy - … Symposium on Security in Computing and …, 2019 - Springer
Traditional methods of authentication are subject to a wide variety of attacks. There is a high demand to deploy necessary mechanisms while authenticating a user to safeguard him/her …
The ubiquity of digital sensors embedded in today's mobile and wearable devices (eg, smartphones, wearable cameras, wristbands) has made technology more intertwined with …
Online and Enterprise resources typically required authentication before user allow to access the sensitive applications and information. Sensitive information contains user …