Modern authentication schemes in smartphones and IoT devices: An empirical survey
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
Benchmarking touchscreen biometrics for mobile authentication
J Fierrez, A Pozo, M Martinez-Diaz… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
We study user interaction with touchscreens based on swipe gestures for personal
authentication. This approach has been analyzed only recently in the last few years in a …
authentication. This approach has been analyzed only recently in the last few years in a …
BioTouchPass2: Touchscreen password biometrics using time-aligned recurrent neural networks
Passwords are still used on a daily basis for all kind of applications. However, they are not
secure enough by themselves in many cases. This work enhances password scenarios …
secure enough by themselves in many cases. This work enhances password scenarios …
No single silver bullet: Measuring the accuracy of password strength meters
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …
password strength meter (PSM) to provide real-time strength feedback upon user …
PassWalk: spatial authentication leveraging lateral shift and gaze on mobile headsets
Secure and usable user authentication on mobile headsets is a challenging problem. The
miniature-sized touchpad on such devices becomes a hurdle to user interactions that impact …
miniature-sized touchpad on such devices becomes a hurdle to user interactions that impact …
BioTouchPass: Handwritten passwords for touchscreen biometrics
R Tolosana, R Vera-Rodriguez… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This work enhances traditional authentication systems based on Personal Identification
Numbers (PIN) and One-Time Passwords (OTP) through the incorporation of biometric …
Numbers (PIN) and One-Time Passwords (OTP) through the incorporation of biometric …
[PDF][PDF] Secure blockchain-based data-sharing model and adoption among intelligence communities.
NAM Razali, WN Wan Muhamad, KK Ishak… - … Journal of Computer …, 2021 - researchgate.net
Data sharing among the intelligence communities is important to consolidate data analysis,
which will support decision-making process to preserve the security of the nation. Data …
which will support decision-making process to preserve the security of the nation. Data …
GestureMeter: Design and Evaluation of a Gesture Password Strength Meter
Gestures drawn on touchscreens have been proposed as an authentication method to
secure access to smartphones. They provide good usability and a theoretically large …
secure access to smartphones. They provide good usability and a theoretically large …
Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform
Diverse applications are used on mobile devices. Because of the increasing dependence on
information systems, immense amounts of personal and sensitive data are stored on mobile …
information systems, immense amounts of personal and sensitive data are stored on mobile …
An energy-efficient accelerator based on hybrid CPU-FPGA devices for password recovery
P Liu, S Li, Q Ding - IEEE Transactions on Computers, 2018 - ieeexplore.ieee.org
Password recovery tools are needed to recover lost and forgotten passwords so as to regain
access to valuable information. As the process of password recovery can be extremely …
access to valuable information. As the process of password recovery can be extremely …