You are currently on the new version of our website. Access the old version .

16 Results Found

  • Article
  • Open Access
5 Citations
14,116 Views
22 Pages

Attacking Windows Hello for Business: Is It What We Were Promised?

  • Joseph Haddad,
  • Nikolaos Pitropakis,
  • Christos Chrysoulas,
  • Mouad Lemoudden and
  • William J. Buchanan

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to...

  • Article
  • Open Access
3 Citations
5,530 Views
20 Pages

User-generated passwords often pose a security risk in authentication systems. However, providing a comparative substitute poses a challenge, given the common tradeoff between security and user experience. This paper integrates cryptographic methods...

  • Article
  • Open Access
3 Citations
4,453 Views
14 Pages

3 December 2017

The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present password...

  • Article
  • Open Access
1 Citations
2,740 Views
23 Pages

Wireless, satellite, and mobile networks are increasingly used in application scenarios to provide advanced services to mobile or nomadic devices. For example, to authenticate mobile users while obtaining access to remote services, a two-factor authe...

  • Feature Paper
  • Article
  • Open Access
6 Citations
5,668 Views
18 Pages

23 April 2024

FIDO (Fast Identity Online) is a set of network identity standards established by the FIDO Alliance. It employs a framework based on public key cryptography to facilitate multi-factor authentication (MFA) and biometric login, ensuring the robust prot...

  • Article
  • Open Access
9 Citations
8,380 Views
17 Pages

5 February 2018

Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securin...

  • Article
  • Open Access
12 Citations
5,261 Views
14 Pages

17 November 2016

The IEEE Std 802.15.6 is an international standard for wireless body area networks (WBANs). It contains many aspects of communications, and also provides security services, since some communications in WBANs can carry sensitive information. In this s...

  • Article
  • Open Access
5 Citations
1,663 Views
19 Pages

25 December 2023

To support more complex and robust online services, enterprise-class applications prefer to interconnect multiple servers as the pedestal to enhance the system’s interoperability. However, the multiserver architecture always struggles to reconc...

  • Article
  • Open Access
28 Citations
6,047 Views
21 Pages

23 May 2022

The use of low-cost sensors in IoT over high-cost devices has been considered less expensive. However, these low-cost sensors have their own limitations such as the accuracy, quality, and reliability of the data collected. Fog computing offers soluti...

  • Article
  • Open Access
2 Citations
2,898 Views
13 Pages

EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback

  • Yingyuan Yang,
  • Jiangnan Li,
  • Sunshin Lee,
  • Xueli Huang and
  • Jinyuan Sun

21 March 2022

Implicit authentication (IA) transparently authenticates users by utilizing their behavioral data sampled from various sensors. Identifying the illegitimate user through constantly analyzing current users’ behavior, IA adds another layer of pro...

  • Article
  • Open Access
7 Citations
3,409 Views
36 Pages

17 June 2023

The Internet of things (IoT) accommodates lightweight sensor/actuator devices with limited resources; hence, more efficient methods for known challenges are sought after. Message queue telemetry transport (MQTT) is a publish/subscribe-based protocol...

  • Feature Paper
  • Article
  • Open Access
37 Citations
7,313 Views
20 Pages

There has been a rapid increase in the number of Internet of Things (IoT) devices in the last few years, providing a wide range of services such as camera feeds, light controls, and door locks for remote access. Access to IoT devices, whether within...

  • Article
  • Open Access
8 Citations
8,625 Views
31 Pages

Single sign-on (SSO) techniques allow access control for multiple systems with a single login. The aim of our study is to construct an authentication algorithm that provides the authentication information of a user to a requester without requiring an...

  • Article
  • Open Access
3 Citations
42,538 Views
41 Pages

Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations

  • Vedran Dakić,
  • Zlatan Morić,
  • Ana Kapulica and
  • Damir Regvart

The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA to enfor...

  • Review
  • Open Access
2,902 Views
17 Pages

13 October 2025

Biometric authentication, such as facial recognition and fingerprint scanning, is now standard on mobile devices, offering secure and convenient access. However, the processing of biometric data is tightly regulated under the European Union’s G...

  • Article
  • Open Access
27 Citations
3,683 Views
21 Pages

P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go

  • Aristeidis Farao,
  • Eleni Veroni,
  • Christoforos Ntantogian and
  • Christos Xenakis

11 April 2021

Due to its flexibility in terms of charging and billing, the smart grid is an enabler of many innovative energy consumption scenarios. One such example is when a landlord rents their property for a specific period to tenants. Then the electricity bil...