Usable security for QR code

R Focardi, FL Luccio, HAM Wahsheh - Journal of Information Security and …, 2019 - Elsevier
QR codes are widely used in various settings such as consumer advertising, commercial
tracking, ticketing and marketing. People tend to scan QR codes and trust their content, but …

Security and privacy of QR code applications: a comprehensive study, general guidelines and solutions

HAM Wahsheh, FL Luccio - Information, 2020 - mdpi.com
The widespread use of smartphones is boosting the market take-up of dedicated
applications and among them, barcode scanning applications. Several barcodes scanners …

BeleniosVS: Secrecy and verifiability against a corrupted voting device

V Cortier, A Filipiak, J Lallemand - 2019 IEEE 32nd computer …, 2019 - ieeexplore.ieee.org
Electronic voting systems aim at two conflicting properties, namely privacy and verifiability,
while trying to minimise the trust assumptions on the various voting components. Most …

Fixing the achilles heel of e-voting: The bulletin board

L Hirschi, L Schmid, D Basin - 2021 IEEE 34th Computer …, 2021 - ieeexplore.ieee.org
The results of electronic elections should be verifiable so that any cheating is detected. To
support this, many protocols employ an electronic bulletin board (BB) for publishing data that …

Academic document authentication using elliptic curve digital signature algorithm and QR code

T Wellem, Y Nataliani, A Iriani - JOIV: International Journal on Informatics …, 2022 - joiv.org
Paper-based documents or printed documents such as recommendation letters, academic
transcripts, and diplomas are prone to forgery. Several methods have been used to protect …

Secure Real‐Time Artificial Intelligence System against Malicious QR Code Links

MS Al-Zahrani, HAM Wahsheh… - Security and …, 2021 - Wiley Online Library
Recently, hackers intend to reproduce malicious links utilizing several ways to mislead
users. They try to control victims' machines or get their data remotely by gaining access to …

Secure and usable QR codes for healthcare systems: the case of covid-19 pandemic

HAM Wahsheh, MS Al-Zahrani - 2021 12th international …, 2021 - ieeexplore.ieee.org
Recently, especially during the COVID-19 pandemic, there is a growing interest in
employing secure technology in health care systems, enhancing workflow, reducing costs …

Secure real-time computational intelligence system against malicious QR code links

HAM Wahsheh, MS Al-Zahrani - International Journal of Computers …, 2021 - univagora.ro
Web attackers aim to propagate malicious links using various techniques to deceive users.
They attempt to control victims' devices or obtain their passwords remotely, thereby …

A survey of the QR code phishing: the current attacks and countermeasures

KSC Yong, KL Chiew, CL Tan - 2019 7th International …, 2019 - ieeexplore.ieee.org
Quick response (QR) code gained popularity and has been adapted for various applications
such as a pointer to digital information and authentication. While the code gives …

Authenticating data transfer using RSA-Generated QR Codes

AMS Pangan, IL Lacuesta, RC Mabborang… - European Journal of …, 2022 - ej-compute.org
Lack of security measures for cybersecurity threat is somewhat vulnerable and can even put
one's digital life at high risk of phishing attack which is so alarming nowadays. Perpetrators …