Multi-factor EEG-based user authentication

T Pham, W Ma, D Tran, P Nguyen… - 2014 International Joint …, 2014 - ieeexplore.ieee.org
Electroencephalography (EEG) signal has been used widely in health and medical fields. It
is also used in brain-computer interface (BCI) systems for humans to continuously control …

Reliable broadcasting and secure distributing in channel networks

F Bao, Y Funyu, Y Hamada… - IEICE transactions on …, 1998 - search.ieice.org
Let T 1,< cd02144. gif>, T n be n spanning trees rooted at node r of graph G. If for any node
v, n paths from r to v, each path in each spanning tree of T 1,< cd02144. gif>, T n, are …

[HTML][HTML] Shoulder surfing: From an experimental study to a comparative framework

L Bošnjak, B Brumen - International Journal of Human-Computer Studies, 2019 - Elsevier
Shoulder surfing is an attack vector widely recognized as a real threat-enough to warrant
researchers dedicating a considerable effort toward designing novel authentication methods …

On quantifying the effective password space of grid-based unlock gestures

E von Zezschwitz, M Eiband, D Buschek… - Proceedings of the 15th …, 2016 - dl.acm.org
We present a similarity metric for Android unlock patterns to quantify the effective password
space of user-defined gestures. Our metric is the first of its kind to reflect that users choose …

[PDF][PDF] Dynamic salt generation and placement for secure password storing

S Boonkrong, C Somboonpattanakit - IAENG International Journal of …, 2016 - iaeng.org
Cryptographic hash functions such as MD5 and SHA-1 are the most popular functions used
for storing passwords. The main problem is that they were not designed to serve such …

Helping novice developers harness security issues in cloud-IoT systems

F Corno, L De Russis, L Mannella - Journal of Reliable Intelligent …, 2022 - Springer
The development of cloud-connected Internet of Things (IoT) systems is becoming more and
more affordable, even to novice programmers, thanks to dedicated cloud platforms that …

On designing a modified-UI based honeyword generation approach for overcoming the existing limitations

N Chakraborty, S Mondal - Computers & Security, 2017 - Elsevier
Inverting hashed passwords by performing brute force computation is one of the latest
security threats on password based authentication technique. New technologies are being …

On password strength: a survey and analysis

G Hu - Software Engineering, Artificial Intelligence …, 2018 - Springer
Password has been a predominating approach for user authentication to gain access to
restricted resources. The main issue with password is its quality or strength, ie how easy (or …

Development of users' information security awareness questionnaire (UISAQ)—Ongoing work

T Velki, K Solic, H Ocevcic - 2014 37th International …, 2014 - ieeexplore.ieee.org
The user is still weakest link regarding information security matters, but studies on this
subject are rare. The aim of this work is to develop general Users' Information Security …

Dissecting android cryptocurrency miners

S Dashevskyi, Y Zhauniarovich… - Proceedings of the …, 2020 - dl.acm.org
Cryptojacking applications pose a serious threat to mobile devices. Due to the extensive
computations, they deplete the battery fast and can even damage the device. In this work we …