Study to improve security for IoT smart device controller: drawbacks and countermeasures

X Su, Z Wang, X Liu, C Choi… - Security and …, 2018 - Wiley Online Library
Including mobile environment, conventional security mechanisms have been adapted to
satisfy the needs of users. However, the device environment‐IoT‐based number of …

Enhancing university services by extending the eIDAS european specification with academic attributes

Á Alonso, A Pozo, A Gordillo, S López-Pernas… - Sustainability, 2020 - mdpi.com
The European electronic IDentification, Authentication and trust Services (eIDAS) regulation
makes available a solution to ensure the cross-border mutual recognition of electronic …

Analysing and comparing the digital seal according to eIDAS regulation with and without blockchain technology

V Alimehaj, A Halili, R Dervishi… - … of Information and …, 2021 - inderscienceonline.com
Digitalisation of public services has already changed the way how we interact with
government. The electronic signature, based on public key cryptography, has strengthened …

Enhancing public digital identity system (SPID) to prevent information leakage

F Buccafurri, L Fotia, G Lax, R Mammoliti - Electronic Government and the …, 2015 - Springer
Abstract Public Digital Identity System (SPID) is the Italian government framework compliant
with the EU eIDAS regulatory environment, aimed at implementing electronic identification …

User-Adapted Web Services by Extending the eIDAS Specification with Functional Attributes

L Marco, A Pozo, G Huecas, J Quemada… - International Journal of …, 2021 - mdpi.com
To provide web services adapted to the users' functional capabilities, diversity must be
considered from the conceptualization and design phases of the services' development. In …

[HTML][HTML] Secure Password-based Authentication Method for Mobile Banking Services

D Choi, D Tak, I Chung - Journal of Korea Multimedia Society, 2016 - koreascience.kr
Moblie device based financial services are vulnerable to social engineering attacks because
of the display screen of mobile devices. In other words, in the case of shoulder surfing …

User biometric information‐based secure method for smart devices

X Su, B Wang, X Zhang, Y Wang… - … Practice and Experience, 2018 - Wiley Online Library
Secure mechanisms have been adapted to satisfy the needs of mobile subscribers;
however, the mobile environment is quite different from a desktop PC or laptop‐based …

Contribution to the Design and Integration of Identity Management and Access Control Mechanisms for Smart Environments

A Pozo Huertas - 2022 - oa.upm.es
Abstract Identity Management and Access Control mechanisms are present in practically
every digital application. Companies, public administrations or universities have deployed …

[引用][C] Effect of e-banking on financial performance of listed commercial banks in Kenya

M Ogutu - 2018 - Kca University

Extending the eIDAS European Specification for Supporting Academic Attributes

A Alonso, A Gordillo, A Pozo… - ICERI2019 …, 2019 - library.iated.org
Secure Electronic Identification (eID) is one of the key enablers of data protection, privacy
and prevention of online fraud. eID can guarantee the unambiguous identification of a …