Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and …
Polymer nanofibers are widely adopted in energy harvesting and pressure sensing applications owing to the large contact area and inherent compressibility. Herein, a high …
S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …
The number of mobile devices, such as smartphones and smartwatches, is relentlessly increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …
This comprehensive study explores the integration and effectiveness of Artificial Intelligence (AI) in Identity and Access Management (IAM) within cloud environments. It primarily focuses …
L Hernández-Álvarez, JM De Fuentes… - Pattern Recognition …, 2021 - Elsevier
Continuous Authentication (CA) approaches are attracting attention due to the explosion of available sensors from IoT devices such as smartphones. However, a critical privacy …
This study presents the current state of research on multi-factor authentication. Authentication is one of the important traits in the security domain as it ensures that …
L Hernández-Álvarez, E Barbierato, S Caputo… - Pattern Recognition …, 2023 - Elsevier
Nowadays, a rapid, easy, and convenient access to our private information is essential to carry out both personal and professional activities. In most cases, this information is …
Continuous Authentication (CA) technologies enable users to be authenticated beyond just the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to …