Zero trust architecture (zta): A comprehensive survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …
number of advocates in the critical infrastructure risk management space. The article …
Recent trends in user authentication–a survey
SW Shah, SS Kanhere - IEEE access, 2019 - ieeexplore.ieee.org
Recent advancements in technology have led to profusion of personal computing devices,
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …
Exploiting diversity in android tls implementations for mobile app traffic classification
Network traffic classification is an important tool for network administrators in enabling
monitoring and service provisioning. Traditional techniques employed in classifying traffic do …
monitoring and service provisioning. Traditional techniques employed in classifying traffic do …
SoK: Web Authentication in the Age of End-to-End Encryption
J Blessing, D Hugenroth, RJ Anderson… - arXiv preprint arXiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …
new challenges for usable authentication. Compared to regular web services, the nature of …
Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets
K Skračić, P Pale, Z Kostanjčar - Computers & security, 2017 - Elsevier
Abstract Knowledge-based authentication methods have become increasingly popular,
where they started as simple passwords, before evolving into static questions for fallback …
where they started as simple passwords, before evolving into static questions for fallback …
Evaluating smartphone-based dynamic security questions for fallback authentication: a field study
Y Albayram, MMH Khan - Human-Centric Computing and Information …, 2016 - Springer
To address the limitations of static challenge question based fallback authentication
mechanisms (eg, easy predictability), recently, smartphone based autobiographical …
mechanisms (eg, easy predictability), recently, smartphone based autobiographical …
Passapp: My app is my password!
Existing graphical passwords require users to proactively memorize their secrets and
meanwhile these schemes are vulnerable to shoulder surfing attacks. We propose a novel …
meanwhile these schemes are vulnerable to shoulder surfing attacks. We propose a novel …
Wi-Auth: WiFi based second factor user authentication
SW Shah, SS Kanhere - Proceedings of the 14th EAI International …, 2017 - dl.acm.org
While second factor authentication (2FA) is now widely available, user adoption is still very
low, as most of 2FA implementations require significant interaction from the user. In this …
low, as most of 2FA implementations require significant interaction from the user. In this …
Quantitative comparison of dynamic treemaps for software evolution visualization
Dynamic treemaps are one of the methods of choice for displaying large hierarchies that
change over time, such as those encoding the structure of evolving software systems. While …
change over time, such as those encoding the structure of evolving software systems. While …
On designing a questionnaire based honeyword generation approach for achieving flatness
N Chakraborty, S Singh… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Honeyword (or fake password) based authentication technique has become a well-
established security mechanism for protecting the original password from the server-side …
established security mechanism for protecting the original password from the server-side …