Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

Recent trends in user authentication–a survey

SW Shah, SS Kanhere - IEEE access, 2019 - ieeexplore.ieee.org
Recent advancements in technology have led to profusion of personal computing devices,
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …

Exploiting diversity in android tls implementations for mobile app traffic classification

S Sengupta, N Ganguly, P De… - The World Wide Web …, 2019 - dl.acm.org
Network traffic classification is an important tool for network administrators in enabling
monitoring and service provisioning. Traditional techniques employed in classifying traffic do …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arXiv preprint arXiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets

K Skračić, P Pale, Z Kostanjčar - Computers & security, 2017 - Elsevier
Abstract Knowledge-based authentication methods have become increasingly popular,
where they started as simple passwords, before evolving into static questions for fallback …

Evaluating smartphone-based dynamic security questions for fallback authentication: a field study

Y Albayram, MMH Khan - Human-Centric Computing and Information …, 2016 - Springer
To address the limitations of static challenge question based fallback authentication
mechanisms (eg, easy predictability), recently, smartphone based autobiographical …

Passapp: My app is my password!

H Sun, K Wang, X Li, N Qin, Z Chen - Proceedings of the 17th …, 2015 - dl.acm.org
Existing graphical passwords require users to proactively memorize their secrets and
meanwhile these schemes are vulnerable to shoulder surfing attacks. We propose a novel …

Wi-Auth: WiFi based second factor user authentication

SW Shah, SS Kanhere - Proceedings of the 14th EAI International …, 2017 - dl.acm.org
While second factor authentication (2FA) is now widely available, user adoption is still very
low, as most of 2FA implementations require significant interaction from the user. In this …

Quantitative comparison of dynamic treemaps for software evolution visualization

EF Vernier, AC Telea, J Comba - 2018 IEEE Working …, 2018 - ieeexplore.ieee.org
Dynamic treemaps are one of the methods of choice for displaying large hierarchies that
change over time, such as those encoding the structure of evolving software systems. While …

On designing a questionnaire based honeyword generation approach for achieving flatness

N Chakraborty, S Singh… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Honeyword (or fake password) based authentication technique has become a well-
established security mechanism for protecting the original password from the server-side …