Zero trust architecture (zta): A comprehensive survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …
number of advocates in the critical infrastructure risk management space. The article …
Recent trends in user authentication–a survey
SW Shah, SS Kanhere - IEEE access, 2019 - ieeexplore.ieee.org
Recent advancements in technology have led to profusion of personal computing devices,
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …
Performance Analysis of Authentication System: A Systematic Literature Review
Background: Data authentication is vital nowadays, as the development of the internet and
its applications allow users to have all-time data availability, attracting attention towards …
its applications allow users to have all-time data availability, attracting attention towards …
ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification
Two-factor authentication provides an additional layer of protection to commonly-occurring
password breaches. However, existing TFA methods, often involve special hardware …
password breaches. However, existing TFA methods, often involve special hardware …
Secure mobile two-factor authentication leveraging active sound sensing
Y Ren, C Chen, H Liu, J Yu, Z Zheng… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The two-factor authentication (2FA) has drawn increasingly attention as the mobile devices
become more prevalent. For example, the user's possession of the enrolled phone could be …
become more prevalent. For example, the user's possession of the enrolled phone could be …
User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices
Physical authentication devices (PADs) offer a higher level of security than other
authentication technologies commonly used in multifactor authentication (MFA) schemes …
authentication technologies commonly used in multifactor authentication (MFA) schemes …
Wi-sign: Device-free second factor user authentication
SW Shah, SS Kanhere - Proceedings of the 15th EAI International …, 2018 - dl.acm.org
Most two-factor authentication (2FA) implementations rely on the user possessing and
interacting with a secondary device (eg mobile phone) which has contributed to the lack of …
interacting with a secondary device (eg mobile phone) which has contributed to the lack of …
FPCA: Parasitic Coding Authentication for UAVs by FM Signals
De-authentication attack is one of the major threats to Unmanned Aerial Vehicle (UAV)
communication, in which the attacker continuously sends de-authentication frames to …
communication, in which the attacker continuously sends de-authentication frames to …
Wi-access: Second factor user authentication leveraging WiFi signals
SW Shah, SS Kanhere - 2018 IEEE International Conference …, 2018 - ieeexplore.ieee.org
Two factor authentication offers significant benefits but has had limited uptake as users find
the extra step required at each authentication attempt (eg, to enter a verification code) to be …
the extra step required at each authentication attempt (eg, to enter a verification code) to be …
Abnormal behavior detection mechanism using deep learning for zero-trust security infrastructure
HW Kim, EH Song - International Journal of Information Technology, 2024 - Springer
As ICT technology has developed, work has become possible in a variety of locations and
working from home has become more active. Intranet-type information network access was …
working from home has become more active. Intranet-type information network access was …