Are we aware? an empirical study on the privacy and security awareness of smartphone sensors

AI Champa, MF Rabbi, FZ Eishita… - 2023 IEEE/ACIS 21st …, 2023 - ieeexplore.ieee.org
Smartphones are equipped with a wide variety of sensors, which can pose significant
security and privacy risks if not properly protected. To assess the privacy and security risks of …

Multi-factor authentication modeling

L Dostálek - 2019 9th International Conference on Advanced …, 2019 - ieeexplore.ieee.org
The work defines a multi-factor authentication model in case the application supports
multiple authentication factors. The aim of this modeling is to find acceptable authentication …

Fingerprinting and personal information leakage from touchscreen interactions

M Georgiev, S Eberz, I Martinovic - Proceedings of the 21st Workshop on …, 2022 - dl.acm.org
The study aims to understand and quantify the privacy threat landscape of touch-based
biometrics. Touch interactions from mobile devices are ubiquitous and do not require …

Continuous touchscreen biometrics: authentication and privacy concerns

MK Georgiev - 2022 - ora.ox.ac.uk
In the age of instant communication, smartphones have become an integral part of our daily
lives, with a significant portion of the population using them for a variety of tasks such as …

Leveraging browser fingerprinting for web authentication

TN Andriamilanto - 2020 - theses.hal.science
Web authentication is the verification that a visitor claiming an account legitimately owns this
account. Several authentication factors were proposed such that each one provides a …

Accesso ai sensori in applicazioni web

G SCHIAVO - thesis.unipd.it
Nel mondo odierno, i dispositivi mobili sono sempre più all'avanguardia con nuove
caratteristiche e funzionalità per cui i sensori, come accelerometro e giroscopio, giocano un …

PROGRESSIVE INFORMATION TECHNOLOGIES.

L Dostálek, J Šafařík - Radio Electronics, Computer Science …, 2020 - search.ebscohost.com
Context. Currently, institutions and companies face massive cyber-attacks. Attacks are
always focused on some authentication weakness that is part of a particular authentication …

[引用][C] Tuşa basış dinamikleri, akselerometre ve jiroskop verileriyle mobil cihazlarda davranışsal biyometrik kimlik doğrulama

UB Balkir - Fen Bilimleri Enstitüsü