Anti-phishing: A comprehensive perspective
G Varshney, R Kumawat, V Varadharajan… - Expert Systems with …, 2024 - Elsevier
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …
information related to individuals and organizations fraudulently. Although Phishing attacks …
[HTML][HTML] How memory anxiety can influence password security behavior
Password reuse and modification are insecure password behaviors that are becoming
increasingly prevalent as users are obliged to remember more passwords to access various …
increasingly prevalent as users are obliged to remember more passwords to access various …
[HTML][HTML] Recent Trends of Authentication Methods in Extended Reality: A Survey
L Hallal, J Rhinelander, R Venkat - Applied System Innovation, 2024 - mdpi.com
Extended Reality (XR) is increasingly gaining momentum in industries such as retail, health,
and education. To protect users' personal data, establishing a secure authentication system …
and education. To protect users' personal data, establishing a secure authentication system …
A Comparative Long-Term Study of Fallback Authentication Schemes
Fallback authentication, the process of re-establishing access to an account when the
primary authenticator is unavailable, holds critical significance. Approaches range from …
primary authenticator is unavailable, holds critical significance. Approaches range from …
[HTML][HTML] Enforcing security policies on interacting authentication systems
Security policies of authentication systems are a crucial factor in mitigating the risk of
impersonation, which is often the first stage of advanced persistent threats. Online …
impersonation, which is often the first stage of advanced persistent threats. Online …
Using a privacy-enhanced authentication process to secure IOT-based smart grid infrastructures
S Rostampour, N Bagheri, B Ghavami… - The Journal of …, 2024 - Springer
Over the last decade, technological advances in smart grids have permitted the
modernization of legacy electricity networks. As Internet of Things (IoT)-based smart grids …
modernization of legacy electricity networks. As Internet of Things (IoT)-based smart grids …
[PDF][PDF] Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication
When adopted by the W3C in 2019, the FIDO2 standard for passwordless authentication
was touted as a replacement for passwords on the web. With FIDO2, users leverage …
was touted as a replacement for passwords on the web. With FIDO2, users leverage …
Priming through Persuasion: Towards Secure Password Behavior
R Paudel, MN Al-Ameen - Proceedings of the ACM on Human-Computer …, 2024 - dl.acm.org
Users tend to create weak passwords even for the important accounts. The prior research
shed light on user's insecure password behavior, and why the interventions, including …
shed light on user's insecure password behavior, and why the interventions, including …
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext
N Tihanyi, T Bisztray, B Borsos… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Using the computational resources of an untrusted third party to crack a password hash can
pose a high number of privacy and security risks. The act of revealing the hash digest could …
pose a high number of privacy and security risks. The act of revealing the hash digest could …
AB-PAKE: Achieving Fine-Grained Access Control and Flexible Authentication
M Song, D Wang - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Two-factor authentication provides a strong defense against account compromise. However,
traditional two-factor authentication schemes cannot provide users with much flexibility and …
traditional two-factor authentication schemes cannot provide users with much flexibility and …