A Survey on Standards for Interoperability and Security in the Internet of Things
Recently, there has been an increase in studies relating to the Internet of Things (IoT) in
various fields, such as smart cities, smart homes, smart factories, and healthcare. In an IoT …
various fields, such as smart cities, smart homes, smart factories, and healthcare. In an IoT …
Continuous multimodal biometric authentication schemes: a systematic review
Building safeguards against illegitimate access and authentication is a cornerstone for
securing systems. Existing user authentication schemes suffer from challenges in detecting …
securing systems. Existing user authentication schemes suffer from challenges in detecting …
Institutional strategies for cybersecurity in higher education institutions
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations.
Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity …
Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity …
" I don't see why I would ever want to use it" Analyzing the Usability of Popular Smartphone Password Managers
S Seiler-Hwang, P Arias-Cabarcos, A Marín… - Proceedings of the …, 2019 - dl.acm.org
Passwords are an often unavoidable authentication mechanism, despite the availability of
additional alternative means. In the case of smartphones, usability problems are aggravated …
additional alternative means. In the case of smartphones, usability problems are aggravated …
A comprehensive survey of context-aware continuous implicit authentication in online learning environments
User authentication is crucial in the digital learning environment to preserve the integrity and
reliability of the learning process. Implicit authentication using biometrics has been …
reliability of the learning process. Implicit authentication using biometrics has been …
[HTML][HTML] A data taxonomy for adaptive multifactor authentication in the internet of health care things
T Suleski, M Ahmed - Journal of Medical Internet Research, 2023 - jmir.org
The health care industry has faced various challenges over the past decade as we move
toward a digital future where services and data are available on demand. The systems of …
toward a digital future where services and data are available on demand. The systems of …
Authentication mechanisms and classification: a literature survey
I Chenchev, A Aleksieva-Petrova, M Petrov - … Computing: Proceedings of …, 2021 - Springer
The Security must be considered from the need of two nodes to communicate with each
other, through the moment of confirmed authentication to the secured establishment. It is an …
other, through the moment of confirmed authentication to the secured establishment. It is an …
[HTML][HTML] The design and evaluation of adaptive biometric authentication systems: Current status, challenges and future direction
Biometric authentication systems may suffer from decreasing recognition performance due
to varying environmental conditions and sample ageing, which cause intra-class variability …
to varying environmental conditions and sample ageing, which cause intra-class variability …
Re-Envisioning industrial control systems security by considering human factors as a core element of Defense-in-Depth
The security of Industrial Control Systems is relevant both for reliable production system
operations and for high-quality throughput in terms of manufactured products. Security …
operations and for high-quality throughput in terms of manufactured products. Security …
On understanding context modelling for adaptive authentication systems
In many situations, it is of interest for authentication systems to adapt to context (eg, when
the user's behavior differs from the previous behavior). Hence, representing the context with …
the user's behavior differs from the previous behavior). Hence, representing the context with …