Authentication systems: A literature review and classification

MH Barkadehi, M Nilashi, O Ibrahim, AZ Fardi… - Telematics and …, 2018 - Elsevier
One of the most important parts of any system is authentication. Appreciated as the first and
the last line of defense in the great majority of cases, authentication systems can usually …

Anti-phishing: A comprehensive perspective

G Varshney, R Kumawat, V Varadharajan… - Expert Systems with …, 2024 - Elsevier
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …

An intelligent classification model for phishing email detection

A Yasin, A Abuhasan - arXiv preprint arXiv:1608.02196, 2016 - arxiv.org
Phishing attacks are one of the trending cyber attacks that apply socially engineered
messages that are communicated to people from professional hackers aiming at fooling …

Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks

G Varshney, M Misra, P Atrey - Journal of Information Security and …, 2018 - Elsevier
Securing user credentials against phishing attacks is an important and challenging research
problem. These days phishing is carried out by real time (RT) and control relay (CR) man in …

Push notification based login using BLE devices

G Varshney, M Misra - 2017 2nd international conferences on …, 2017 - ieeexplore.ieee.org
Due to the consistent number of phishing attacks there is a need to develop secure
authentication schemes. These days phishing is mostly carried out using malicious browser …

A Passwordless MFA Utlizing Biometrics, Proximity and Contactless Communication

S Shukla, G Varshney, S Singh, S Goel - arXiv preprint arXiv:2406.09000, 2024 - arxiv.org
Despite being more secure and strongly promoted, two-factor (2FA) or multi-factor (MFA)
schemes either fail to protect against recent phishing threats such as real-time MITM …

Multi-factor authentication scheme using mobile app and camera

S Jindal, M Misra - International Conference on Advanced Communication …, 2019 - Springer
Phishing attacks are one of the most serious threats faced by the users on the internet the
attackers try to steal sensitive information such as login details, credit card details, etc. by …

A new secure authentication scheme for web login using BLE smart devices

G Varshney, M Misra, P Atrey - 2017 11th IEEE International …, 2017 - ieeexplore.ieee.org
Existing user authentication schemes used for login to a website are incapable of handling
recent phishing attacks such as real time (RT)/control relay (CR) man in the middle (MITM) …

CamPass: a Secure Camera-based Password Manager for Kiosk Browsing

R Zhao - 2023 IEEE 22nd International Conference on Trust …, 2023 - ieeexplore.ieee.org
Text-based passwords have dominated online user authentication for decades and have
been constantly targeted by harvesting and phishing attacks. Password managers have …

[PDF][PDF] Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT).

A Yasin, A Abuhasan - Int. Arab J. Inf. Technol., 2018 - ccis2k.org
Phishing is a kind of social engineering attack in which experienced persons or entities fool
novice users to share their sensitive information such as usernames, passwords, credit card …