In this paper, we analyze the inherent characteristic of electronic medical records (EMRs) from actual electronic health (eHealth) systems, where we found that first, multiple patients …
This paper offers an up-to-date, comprehensive, extensive and targeted survey on Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
A Juels, RL Rivest - Proceedings of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We propose a simple method for improving the security of hashed passwords: the maintenance of additional``honeywords''(false passwords) associated with each user's …
Two-factor authentication protects online accounts even if passwords are leaked. Most users, however, prefer password-only authentication. One reason why twofactor …
Despite the additional protection it affords, two-factor authentication (2FA) adoption reportedly remains low. To better understand 2FA adoption and its barriers, we observed the …
PS Kochhar, F Thung, D Lo - 2015 IEEE 22nd international …, 2015 - ieeexplore.ieee.org
During software maintenance, testing is a crucial activity to ensure the quality of program code as it evolves over time. With the increasing size and complexity of software, adequate …
A Yasin, A Abuhasan - arXiv preprint arXiv:1608.02196, 2016 - arxiv.org
Phishing attacks are one of the trending cyber attacks that apply socially engineered messages that are communicated to people from professional hackers aiming at fooling …
Mobile devices are promising to apply two-factor authentication in order to improve system security and enhance user privacy-preserving. Existing solutions usually have certain limits …
We carry out the first provable security analysis of the new FIDO2 protocols, the promising FIDO Alliance's proposal for a standard for passwordless user authentication. Our analysis …