Intelligence and security in big 5G-oriented IoNT: An overview
F Al-Turjman - Future generation computer systems, 2020 - Elsevier
Abstract Internet of Nano-Things (IoNT) overcomes critical difficulties and additionally open
doors for wearable sensor based huge information examination. Conventional computing …
doors for wearable sensor based huge information examination. Conventional computing …
[HTML][HTML] A survey exploring open source Intelligence for smarter password cracking
From the end of the last century to date, consumers are increasingly living their lives online.
In today's world, the average person spends a significant proportion of their time connecting …
In today's world, the average person spends a significant proportion of their time connecting …
A comprehensive quality evaluation of security and privacy advice on the web
EM Redmiles, N Warford, A Jayanti, A Koneru… - 29th USENIX Security …, 2020 - usenix.org
End users learn defensive security behaviors from a variety of channels, including a plethora
of security advice given in online articles. A great deal of effort is devoted to getting users to …
of security advice given in online articles. A great deal of effort is devoted to getting users to …
Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication
SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
Secure multifactor authenticated key agreement scheme for industrial IoT
R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The application of Internet of Things (IoT) has generally penetrated into people's life and
become popular in recent years. The IoT devices with different functions are integrated and …
become popular in recent years. The IoT devices with different functions are integrated and …
Quantum-safe round-optimal password authentication for mobile devices
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
T2pair: Secure and usable pairing for heterogeneous iot devices
Secure pairing is key to trustworthy deployment and application of Internet of Things (IoT)
devices. However, IoT devices lack conventional user interfaces, such as keyboards and …
devices. However, IoT devices lack conventional user interfaces, such as keyboards and …
That was then, this is now: A security evaluation of password generation, storage, and autofill in browser-based password managers
Password managers have the potential to help users more effectively manage their
passwords and address many of the concerns surrounding password-based authentication …
passwords and address many of the concerns surrounding password-based authentication …
{“You} still use the password after {all”}–Exploring {FIDO2} Security Keys in a Small Company
The goal of the FIDO2 project is to provide secure and usable alternatives to password-
based authentication on the Web. It relies on public-key credentials, which a user can …
based authentication on the Web. It relies on public-key credentials, which a user can …