Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes

S Gupta, C Maple, B Crispo, K Raja, A Yautsiukhin… - Pattern Recognition, 2023 - Elsevier
The proliferation of Internet of Things (IoT) systems is having a profound impact across all
aspects of life. Recognising and identifying particular users is central to delivering the …

AGE: Authentication in gadget-free healthcare environments

T Kumar, A Braeken, AD Jurcut, M Liyanage… - Information Technology …, 2020 - Springer
Mobile and sensor related technologies are significantly revolutionizing the medical and
healthcare sectors. In current healthcare systems, gadgets are the prominent way of …

Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations

A Constantinides, M Belk, C Fidas, R Beumers… - ACM Transactions on …, 2023 - dl.acm.org
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …

Authentication mechanisms and classification: a literature survey

I Chenchev, A Aleksieva-Petrova, M Petrov - … Computing: Proceedings of …, 2021 - Springer
The Security must be considered from the need of two nodes to communicate with each
other, through the moment of confirmed authentication to the secured establishment. It is an …

Risk-driven behavioral biometric-based one-shot-cum-continuous user authentication scheme

A Buriro, S Gupta, A Yautsiukhin, B Crispo - Journal of Signal Processing …, 2021 - Springer
The paper presents a risk-driven behavioral biometric-based user authentication scheme for
smartphones. Our scheme delivers one-shot-cum-continuous authentication, thus not only …

Continuous authentication through gait analysis on a wrist-worn device

G Cola, A Vecchio, M Avvenuti - Pervasive and Mobile Computing, 2021 - Elsevier
Being distinctive of every individual, gait can be used as a biometric feature to authenticate
the owner of a wearable device. This paper proposes and evaluates an authentication …

Next-generation user authentication schemes for iot applications

S Gupta - 2020 - iris.unitn.it
The unprecedented rise of IoT has revolutionized every business vertical enthralling people
to embrace IoT applications in their day-to-day lives to accrue multifaceted benefits. It is …

The review of non-technical assumptions in digital identity architectures

A Bazarhanova, K Smolander - 2020 - aisel.aisnet.org
The literature on digital identity management systems (IdM) is abundant and solutions vary
by technology components and non-technical requirements. In the long run, however, there …

A generic multimodels-based approach for the analysis of usability and security of authentication mechanisms

N Broders, C Martinie, P Palanque, M Winckler… - … Engineering: 8th IFIP …, 2020 - Springer
Authentication is a security function, added on top of an interactive system, whose role is to
reduce organizations and users' risks to grant access to sensitive data or critical resources to …