Security for 5G and beyond
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …
connect almost all aspects of life through the network with much higher speed, very low …
A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes
The proliferation of Internet of Things (IoT) systems is having a profound impact across all
aspects of life. Recognising and identifying particular users is central to delivering the …
aspects of life. Recognising and identifying particular users is central to delivering the …
AGE: Authentication in gadget-free healthcare environments
Mobile and sensor related technologies are significantly revolutionizing the medical and
healthcare sectors. In current healthcare systems, gadgets are the prominent way of …
healthcare sectors. In current healthcare systems, gadgets are the prominent way of …
Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …
Authentication mechanisms and classification: a literature survey
I Chenchev, A Aleksieva-Petrova, M Petrov - … Computing: Proceedings of …, 2021 - Springer
The Security must be considered from the need of two nodes to communicate with each
other, through the moment of confirmed authentication to the secured establishment. It is an …
other, through the moment of confirmed authentication to the secured establishment. It is an …
Risk-driven behavioral biometric-based one-shot-cum-continuous user authentication scheme
The paper presents a risk-driven behavioral biometric-based user authentication scheme for
smartphones. Our scheme delivers one-shot-cum-continuous authentication, thus not only …
smartphones. Our scheme delivers one-shot-cum-continuous authentication, thus not only …
Continuous authentication through gait analysis on a wrist-worn device
Being distinctive of every individual, gait can be used as a biometric feature to authenticate
the owner of a wearable device. This paper proposes and evaluates an authentication …
the owner of a wearable device. This paper proposes and evaluates an authentication …
Next-generation user authentication schemes for iot applications
S Gupta - 2020 - iris.unitn.it
The unprecedented rise of IoT has revolutionized every business vertical enthralling people
to embrace IoT applications in their day-to-day lives to accrue multifaceted benefits. It is …
to embrace IoT applications in their day-to-day lives to accrue multifaceted benefits. It is …
The review of non-technical assumptions in digital identity architectures
A Bazarhanova, K Smolander - 2020 - aisel.aisnet.org
The literature on digital identity management systems (IdM) is abundant and solutions vary
by technology components and non-technical requirements. In the long run, however, there …
by technology components and non-technical requirements. In the long run, however, there …
A generic multimodels-based approach for the analysis of usability and security of authentication mechanisms
Authentication is a security function, added on top of an interactive system, whose role is to
reduce organizations and users' risks to grant access to sensitive data or critical resources to …
reduce organizations and users' risks to grant access to sensitive data or critical resources to …