Anti-phishing: A comprehensive perspective

G Varshney, R Kumawat, V Varadharajan… - Expert Systems with …, 2024 - Elsevier
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …

[HTML][HTML] How memory anxiety can influence password security behavior

N Woods, M Siponen - Computers & Security, 2024 - Elsevier
Password reuse and modification are insecure password behaviors that are becoming
increasingly prevalent as users are obliged to remember more passwords to access various …

[HTML][HTML] Recent Trends of Authentication Methods in Extended Reality: A Survey

L Hallal, J Rhinelander, R Venkat - Applied System Innovation, 2024 - mdpi.com
Extended Reality (XR) is increasingly gaining momentum in industries such as retail, health,
and education. To protect users' personal data, establishing a secure authentication system …

A Comparative Long-Term Study of Fallback Authentication Schemes

L Lassak, P Markert, M Golla, E Stobert… - Proceedings of the CHI …, 2024 - dl.acm.org
Fallback authentication, the process of re-establishing access to an account when the
primary authenticator is unavailable, holds critical significance. Approaches range from …

[HTML][HTML] Enforcing security policies on interacting authentication systems

F Buccafurri, V De Angelis, S Lazzaro, A Pugliese - Computers & Security, 2024 - Elsevier
Security policies of authentication systems are a crucial factor in mitigating the risk of
impersonation, which is often the first stage of advanced persistent threats. Online …

Using a privacy-enhanced authentication process to secure IOT-based smart grid infrastructures

S Rostampour, N Bagheri, B Ghavami… - The Journal of …, 2024 - Springer
Over the last decade, technological advances in smart grids have permitted the
modernization of legacy electricity networks. As Internet of Things (IoT)-based smart grids …

[PDF][PDF] Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication

L Lassak, E Pan, B Ur, M Golla - 2024 - usenix.org
When adopted by the W3C in 2019, the FIDO2 standard for passwordless authentication
was touted as a replacement for passwords on the web. With FIDO2, users leverage …

Priming through Persuasion: Towards Secure Password Behavior

R Paudel, MN Al-Ameen - Proceedings of the ACM on Human-Computer …, 2024 - dl.acm.org
Users tend to create weak passwords even for the important accounts. The prior research
shed light on user's insecure password behavior, and why the interventions, including …

Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext

N Tihanyi, T Bisztray, B Borsos… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Using the computational resources of an untrusted third party to crack a password hash can
pose a high number of privacy and security risks. The act of revealing the hash digest could …

AB-PAKE: Achieving Fine-Grained Access Control and Flexible Authentication

M Song, D Wang - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Two-factor authentication provides a strong defense against account compromise. However,
traditional two-factor authentication schemes cannot provide users with much flexibility and …