Gotta CAPTCHA'Em all: a survey of 20 Years of the human-or-computer Dilemma

M Guerar, L Verderame, M Migliardi… - ACM Computing …, 2021 - dl.acm.org
A recent study has found that malicious bots generated nearly a quarter of overall website
traffic in 2019 [102]. These malicious bots perform activities such as price and content …

Stay home! Conducting remote usability evaluations of novel real-world authentication systems using virtual reality

F Mathis, J O'hagan, K Vaniea, M Khamis - Proceedings of the 2022 …, 2022 - dl.acm.org
Evaluating interactive systems often requires researchers to invite user study participants to
the lab. However, corresponding evaluations often lack realism and participants are usually …

CirclePIN: A novel authentication mechanism for smartwatches to prevent unauthorized access to IoT devices

M Guerar, L Verderame, A Merlo, F Palmieri… - ACM Transactions on …, 2020 - dl.acm.org
In the last months, the market for personal wearable devices has been booming significantly,
and, in particular, smartwatches are starting to assume a fundamental role in the Bring Your …

The feet in human-centred security: Investigating foot-based user authentication for public displays

K Watson, R Bretin, M Khamis, F Mathis - CHI Conference on Human …, 2022 - dl.acm.org
A large body of work investigated touch, mid-air, and gaze-based user authentication.
However, little is known about authentication using other human body parts. In this paper …

Securing PIN‐based authentication in smartwatches with just two gestures

M Guerar, M Migliardi, F Palmieri… - Concurrency and …, 2020 - Wiley Online Library
Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to
develop sophisticated applications that make daily life easier and more convenient for …

2GesturePIN: Securing PIN-Based authentication on smartwatches

M Guerar, L Verderame, M Migliardi… - 2019 IEEE 28th …, 2019 - ieeexplore.ieee.org
Smartwatches offer new capabilities to develop sophisticated applications that make daily
life easier and more convenient for consumers and are becoming increasingly ubiquitous …

An Intersection Attack on the CirclePIN Smartwatch Authentication Mechanism

D Chefrour, Y Sedira, S Chabbi - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
We present a thorough security analysis of a recent smartwatch authentication mechanism
called CirclePIN, which was considered resilient to several attacks, including shoulder …

Spinpad: a secured pin number based user authentication scheme

S Rajarajan, R Kalita, T Gayatri… - … on Recent Trends in …, 2018 - ieeexplore.ieee.org
Securing the smart phones against user authentication attacks has been a major concern for
the banks that offer mobile banking services. While the users enter their PIN numbers to get …

A new security solution enhancing the dynamic array pin protocol

S Chabbi, N El Madhoun - 2022 International Wireless …, 2022 - ieeexplore.ieee.org
In order to authenticate a user on an Automated Teller Machine (ATM) using Near Field
Communication (NFC) technology embedded on smartphones, we recently proposed a new …

SSI-MedRx: A Fraud-Resilient Healthcare System based on Blockchain and SSI

M Guerar, M Migliardi, E Russo, D Khadraoui… - Authorea …, 2024 - techrxiv.org
Today, healthcare fraud poses a significant issue, encompassing everything from falsified
billing claims and phantom services to the excessive prescription of opioid medications and …