-
1
Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control
Published 2022-01-01Subjects: “…Adaptive user authentication…”
Get full text
Article -
2
A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
Published 2023-03-01Subjects: “…continuous user authentication…”
Get full text
Article -
3
Bridging Usability and Accessibility of User Authentication using Usable Accessed (UAce) for Online Payment Applications
Published 2021-12-01Subjects: Get full text
Article -
4
Authentication methods for voice services on smart speakers – a multi-method study on perceived security and ease of use
Published 2023-03-01Subjects: Get full text
Article -
5
Analysis of Targeted Mouse Movements for Gender Classification
Published 2017-12-01Subjects: “…User Authentication…”
Get full text
Article -
6
Prototyping a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control
Published 2024-08-01Subjects: “…adaptive user authentication…”
Get full text
Article -
7
Spoofing detection on adaptive authentication System‐A survey
Published 2022-03-01Subjects: Get full text
Article -
8
Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability
Published 2024-02-01Subjects: “…user authentication…”
Get full text
Article -
9
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Published 2017-12-01Subjects: “…user authentication…”
Get full text
Article -
10
User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes
Published 2022-09-01Subjects: Get full text
Article -
11
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
Published 2023-08-01Subjects: Get full text
Article -
12
Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
Published 2020-03-01Subjects: Get full text
Article -
13
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks
Published 2018-12-01Subjects: Get full text
Article -
14
Evaluating biometrics fingerprint template protection for an emergency situation
Published 2019-01-01Subjects: “…biometric-based user authentication…”
Get full text
Article -
15
Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication
Published 2020-02-01Subjects: Get full text
Article -
16
Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors
Published 2016-07-01Subjects: Get full text
Article -
17
An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
Published 2022-11-01Subjects: Get full text
Article -
18
Lightweight Hash-Based Authentication Protocol for Smart Grids
Published 2024-05-01Subjects: Get full text
Article -
19
Practice on security of big data platform
Published 2017-09-01Subjects: “…big data security;user authentication;log audit;digit security…”
Get full text
Article -
20
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch
Published 2018-08-01Subjects: Get full text
Article