Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

Usable Security: A Systematic Literature Review

F Di Nocera, G Tempestini, M Orsini - Information, 2023 - mdpi.com
Usable security involves designing security measures that accommodate users' needs and
behaviors. Balancing usability and security poses challenges: the more secure the systems …

A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability

SZ Nizamani, SR Hassan, RA Shaikh… - IEEE …, 2021 - ieeexplore.ieee.org
Despite numerous efforts, developing an authentication scheme that offers strong security
while offering memorability and usability remains a grand challenge. In this paper, we …

Multilayer symmetric and asymmetric technique for audiovisual cryptography

A Parekh, M Antani, K Suvarna, R Mangrulkar… - Multimedia Tools and …, 2024 - Springer
In order to ensure the secure transmission and storage of video content, this research work
provides a video encryption algorithm using symmetric and asymmetric encryption methods …

Attention based: modeling human perception of reflectional symmetry in the wild

H Akbar, MM Iqbal - Journal of Ambient Intelligence and Humanized …, 2024 - Springer
Symmetry exists everywhere, presenting itself in various forms and scales. Humans take
advantage of symmetry for various tasks, but superb symmetry perception through …

[PDF][PDF] IoT devices authentication using artificial neural network

SSU Hasan, A Ghani, IU Din, A Almogren… - Comput. Mater …, 2022 - researchgate.net
User authentication is one of the critical concerns of information security. Users tend to use
strong textual passwords, but remembering complex passwords is hard as they often write it …

Performance evaluation of Cuckoo filters as an enhancement tool for password cracking

MD Cano, A Villafranca, I Tasic - Cybersecurity, 2023 - Springer
Cyberthreats continue their expansion, becoming more and more complex and varied.
However, credentials and passwords are still a critical point in security. Password cracking …

Biometric based wireless network security-status, challenges and future trends

SB Sadkhan, MS Jafar - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Every day, the acceptance of mobile products and cloud computing services grows. The
concerns of tested candid user, that is a fundamental flaw in classical decryption, are …

Social Engineering Shoulder Surfing Attacks (SSAs): A Literature Review. Lessons, Challenges, and Future Directions

B Zurita, S Bosque, W Fuertes, M Macas - International Conference on …, 2023 - Springer
Abstract Shoulder Surfing Attacks (SSAs) represent a significant threat to user authentication
(UA) methods, especially to the process based on the user's knowledge in which the …

Hybrid Visual Verification

SN Bushra, AS Ismail, P Sasigresa… - 2024 14th International …, 2024 - ieeexplore.ieee.org
Data security is becoming increasingly important as cloud computing advances. Data
security is the fundamental problem of all distributed computing systems. Cloud computing …