In current single sign‐on authentication schemes on the web, users are required to interact with identity providers securely to set up authentication data during a registration phase and …
We present a seamless challenge-response authentication protocol which leverages on the variations of html5 canvas rendering made by the software and hardware stacks. After a …
MA Mustafa, A Konios… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Activities of daily living (ADL) systems have been playing an important role in assessing and monitoring the quality of life of elderly people for many years. With the recent advancement …
We propose a collaborative authentication protocol where multiple user devices (eg, a smartphone, a smartwatch and a wristband) collaborate to authenticate the user to a third …
Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile …
Users or devices regularly need to demonstrate who they are on the Internet to enable decisions like whether they can access a certain resource such as a service. This often …
Mobile Collaborative Authentication Page 1 Mobile Collaborative Authentication Yoshi Vermeire Thesis submitted for the degree of Master of Science in Electrical Engineering, option ICT …
Users or devices regularly need to demonstrate who they are on the Internet to enable decisions like whether they can access a certain resource such as a service. This often …
Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile …